<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Membership — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/membership/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 04 Apr 2026 09:16:20 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/membership/feed.xml" rel="self" type="application/rss+xml"/><item><title>ProfilePress WordPress Plugin Membership Payment Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-profilepress-bypass/</link><pubDate>Sat, 04 Apr 2026 09:16:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-profilepress-bypass/</guid><description>The ProfilePress WordPress plugin before 4.16.12 is vulnerable to an unauthorized membership payment bypass, allowing authenticated attackers to obtain paid memberships without payment by manipulating subscription IDs during checkout.</description><content:encoded><![CDATA[<p>The ProfilePress plugin for WordPress, specifically the &ldquo;Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile &amp; Restrict Content&rdquo; version 4.16.11 and earlier, contains a vulnerability (CVE-2026-3445) that allows authenticated attackers to bypass membership payment requirements. This flaw stems from a missing ownership verification on the <code>change_plan_sub_id</code> parameter within the <code>process_checkout()</code> function. An attacker with subscriber-level access can exploit this by referencing another user&rsquo;s active subscription during the checkout process. This manipulation affects proration calculations, ultimately enabling the attacker to obtain paid lifetime membership plans without submitting legitimate payment. This vulnerability is triggered via the <code>ppress_process_checkout</code> AJAX action, making it critical for defenders to implement appropriate detection and mitigation strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker registers a new account on the WordPress site with the vulnerable ProfilePress plugin installed, obtaining subscriber-level access.</li>
<li>The attacker identifies a valid, active subscription ID belonging to another user within the ProfilePress system.</li>
<li>The attacker initiates the purchase of a paid membership plan (e.g., a lifetime membership).</li>
<li>During the checkout process, the attacker intercepts the HTTP request sent to the <code>ppress_process_checkout</code> AJAX action.</li>
<li>The attacker modifies the <code>change_plan_sub_id</code> parameter within the request, replacing the expected value with the subscription ID of the other user.</li>
<li>The server-side <code>process_checkout()</code> function fails to properly validate the ownership of the provided <code>change_plan_sub_id</code>.</li>
<li>Due to the manipulated <code>change_plan_sub_id</code>, the proration calculations are skewed, resulting in a significantly reduced or zeroed payment amount.</li>
<li>The attacker completes the checkout process without making a legitimate payment and is granted access to the paid membership plan.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3445 allows attackers to bypass payment requirements and gain unauthorized access to premium content and features offered through the ProfilePress plugin. This can result in significant revenue loss for website owners relying on paid memberships. The number of affected websites is potentially large, given the popularity of WordPress and the ProfilePress plugin. This vulnerability could also damage the reputation of the affected website and erode trust among legitimate paying members.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to ProfilePress version 4.16.12 or later to patch CVE-2026-3445 (reference: vulnerability description).</li>
<li>Deploy the Sigma rule <code>Detect ProfilePress Membership Bypass Attempt</code> to your SIEM and tune for your environment to detect potential exploitation attempts by monitoring for the use of the <code>ppress_process_checkout</code> AJAX action with suspicious <code>change_plan_sub_id</code> values (reference: Sigma rule).</li>
<li>Monitor web server logs for POST requests to the <code>/wp-admin/admin-ajax.php</code> endpoint with the <code>action</code> parameter set to <code>ppress_process_checkout</code> to identify potential exploit attempts (reference: Attack Chain).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>vulnerability</category><category>membership</category></item></channel></rss>