{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T12:21:32.229","vulnerabilities":[{"cve":{"id":"CVE-2026-4056","sourceIdentifier":"security@wordfence.com","published":"2026-03-24T00:16:31.403","lastModified":"2026-04-24T16:32:53.997","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The User Registration & Membership plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the Content Access Rules REST API endpoints in versions 5.0.1 through 5.1.4. This is due to the `check_permissions()` method only checking for `edit_posts` capability instead of an administrator-level capability. This makes it possible for authenticated attackers, with Contributor-level access and above, to list, create, modify, toggle, duplicate, and delete site-wide content restriction rules, potentially exposing restricted content or denying legitimate user access."},{"lang":"es","value":"El plugin User Registration &amp; Membership para WordPress es vulnerable a la modificación no autorizada de datos debido a una comprobación de capacidad faltante en los endpoints de la API REST de Reglas de Acceso al Contenido en las versiones 5.0.1 a 5.1.4. Esto se debe a que el método 'check_permissions()' solo comprueba la capacidad 'edit_posts' en lugar de una capacidad de nivel de administrador. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior, puedan listar, crear, modificar, alternar, duplicar y eliminar reglas de restricción de contenido de todo el sitio, exponiendo potencialmente contenido restringido o denegando el acceso a usuarios legítimos."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-862"}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/user-registration/tags/5.1.1/modules/content-restriction/includes/RestApi/controllers/version1/class-urcr-content-access-rules.php#L116","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/browser/user-registration/trunk/modules/content-restriction/includes/RestApi/controllers/version1/class-urcr-content-access-rules.php#L116","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/changeset/3485702/user-registration/trunk/modules/content-restriction/includes/RestApi/controllers/version1/class-urcr-content-access-rules.php","source":"security@wordfence.com"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/7bb5a5a2-9644-4850-a5f9-7c925af000c8?source=cve","source":"security@wordfence.com"}]}}]}