<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Paid Memberships Pro Plugin — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/paid-memberships-pro-plugin/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 May 2026 12:16:16 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/paid-memberships-pro-plugin/feed.xml" rel="self" type="application/rss+xml"/><item><title>Paid Memberships Pro Plugin Vulnerability Allows Unauthorized Stripe Webhook Modification</title><link>https://feed.craftedsignal.io/briefs/2026-05-pmpro-stripe-webhook-vuln/</link><pubDate>Sat, 02 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pmpro-stripe-webhook-vuln/</guid><description>The Paid Memberships Pro plugin for WordPress is vulnerable to unauthorized modification of Stripe webhook configurations due to missing capability checks, allowing authenticated attackers with Subscriber-level access to disrupt payment processing.</description><content:encoded><![CDATA[<p>The Paid Memberships Pro plugin, a popular WordPress plugin for managing paid subscriptions, contains a vulnerability (CVE-2026-4100) that allows authenticated attackers with minimal privileges (Subscriber-level access) to manipulate Stripe webhook configurations. This flaw exists in versions up to and including 3.6.5 due to missing capability checks on specific AJAX handlers. An attacker exploiting this vulnerability can delete, create, or rebuild the site&rsquo;s Stripe webhook, leading to significant disruptions in payment processing, subscription renewal synchronization, cancellation handling, and management of failed payments. This vulnerability puts revenue streams and customer relationships at risk for any organization using the affected plugin versions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains Subscriber-level access to the WordPress site, either through registration or compromised credentials.</li>
<li>The attacker crafts a malicious AJAX request targeting the <code>wp_ajax_pmpro_stripe_create_webhook</code> endpoint.</li>
<li>Alternatively, the attacker crafts a malicious AJAX request to the <code>wp_ajax_pmpro_stripe_delete_webhook</code> endpoint.</li>
<li>Or, the attacker crafts a malicious AJAX request to the <code>wp_ajax_pmpro_stripe_rebuild_webhook</code> endpoint.</li>
<li>Due to missing capability checks, the server processes the request without proper authorization.</li>
<li>The Stripe webhook configuration is modified, deleted, or rebuilt based on the attacker&rsquo;s request.</li>
<li>Legitimate payment processing and subscription management processes fail due to the altered webhook configuration.</li>
<li>The attacker effectively disrupts the site&rsquo;s ability to collect payments and manage subscriptions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to completely disrupt a WordPress site&rsquo;s payment processing and subscription management functionalities. This can result in significant financial losses due to interrupted sales and subscription renewals. Furthermore, the disruption can damage customer trust and lead to churn as users experience issues with their subscriptions. The vulnerability affects all sites using Paid Memberships Pro plugin versions up to 3.6.5.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Paid Memberships Pro plugin to the latest version to patch CVE-2026-4100.</li>
<li>Monitor WordPress web server logs for POST requests to <code>/wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>pmpro_stripe_create_webhook</code>, <code>pmpro_stripe_delete_webhook</code>, or <code>pmpro_stripe_rebuild_webhook</code> using the &ldquo;Detect Suspicious PMPro Stripe Webhook AJAX Requests&rdquo; Sigma rule.</li>
<li>Review user roles and permissions to minimize the number of users with Subscriber-level access as a temporary mitigation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>stripe</category><category>webhook</category><category>vulnerability</category><category>plugin</category></item></channel></rss>