CVE-2025-12018
Description
The MembershipWorks – Membership, Events & Directory plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 6.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in MembershipWorks plugin ≤6.14 allows admin-level attackers to inject scripts via unsanitized settings, affecting multisite or unfiltered_html-disabled installs.
The MembershipWorks – Membership, Events & Directory plugin for WordPress (versions up to and including 6.14) contains a stored cross-site scripting (XSS) vulnerability in its admin settings. The root cause is twofold: first, the plugin uses esc_textarea() to escape user-supplied values that are then placed into HTML attributes (e.g., value="value"), where escaped"), where esc_attr() should be used instead. Second, several member-only message fields are output directly into HTML content without any escaping at all [1].
Exploitation requires an authenticated attacker with administrator-level permissions. The attacker can inject arbitrary JavaScript payloads into plugin settings fields such as the directory search button text or member-only content messages. When a non-member visitor accesses a page containing the [memberonly] shortcode, the injected script executes in the visitor's browser. This attack vector is limited to WordPress multisite installations or any site where the unfiltered_html capability has been disabled for administrators [1][2].
Successful exploitation allows the attacker to execute arbitrary web scripts in the context of any user who views the affected page. This can lead to session hijacking, defacement, or redirection to malicious sites. The vulnerability does not require any additional user interaction beyond viewing the compromised page [1].
As of the publication date, the vendor has not released a patched version. The only the vulnerable version 6.14 and earlier are affected. Administrators should disable the plugin or apply strict content security policies until a fix is available. The vulnerability is not known to be exploited in the wild at this time [1][2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=6.14
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/zast-ai/vulnerability-reports/blob/main/wordpress/plugin/memberfindme/stored-xss.mdnvd
- plugins.trac.wordpress.org/browser/memberfindme/tags/6.14/memberfindme.phpnvd
- plugins.trac.wordpress.org/browser/memberfindme/tags/6.14/memberfindme.phpnvd
- plugins.trac.wordpress.org/changesetnvd
- wordpress.org/plugins/memberfindme/nvd
- www.wordfence.com/threat-intel/vulnerabilities/id/7cd412d8-6d14-4803-aae6-087e02f9d75fnvd
News mentions
0No linked articles in our index yet.