Paid Memberships Pro Plugin: Stripe Webhook Vulnerability CVE-2026-4100
The National Vulnerability Database reports a critical flaw, CVE-2026-4100, in the Paid Memberships Pro plugin for WordPress, impacting all versions up to and including 3.6.5. This vulnerability stems from missing capability checks on several AJAX handlers, specifically wp_ajax_pmpro_stripe_create_webhook, wp_ajax_pmpro_stripe_delete_webhook, and wp_ajax_pmpro_stripe_rebuild_webhook.
This oversight allows authenticated attackers with even Subscriber-level access to manipulate the site’s Stripe webhook configuration. They can delete, create, or rebuild these webhooks, effectively disrupting all payment processing, subscription renewals, cancellation handling, and failed payment management. The National Vulnerability Database assigns this a CVSS score of 7.1 (HIGH), underscoring the severe operational impact on sites relying on this plugin for payment functionality.
For defenders, this is a direct hit to business continuity. An attacker doesn’t need high-level privileges to cripple revenue streams and customer management. This isn’t just a data breach risk; it’s a denial-of-service against financial operations, creating immediate and tangible damage to any organization using the plugin for paid memberships.
What This Means For You
- If your organization uses the Paid Memberships Pro plugin for WordPress, you must immediately audit your plugin version. This vulnerability allows low-privileged attackers to disable your Stripe payment processing. Patch to a version beyond 3.6.5 as soon as an update is available, and scrutinize logs for any unauthorized webhook modifications.
Related ATT&CK Techniques
🛡️ Detection Rules
4 rules · 6 SIEM formats4 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-4100 - Paid Memberships Pro Stripe Webhook Unauthorized Modification
title: CVE-2026-4100 - Paid Memberships Pro Stripe Webhook Unauthorized Modification
id: scw-2026-05-02-ai-1
status: experimental
level: high
description: |
This rule detects attempts to create or modify Stripe webhook configurations via the Paid Memberships Pro plugin's AJAX handlers. Attackers with subscriber-level access can exploit this vulnerability (CVE-2026-4100) to disrupt payment processing and subscription synchronization by creating, deleting, or rebuilding webhooks without proper authorization. This detection focuses on the specific AJAX action 'pmpro_stripe_create_webhook' which is part of the vulnerability.
author: SCW Feed Engine (AI-generated)
date: 2026-05-02
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-4100/
tags:
- attack.impact
- attack.t1531
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/wp-admin/admin-ajax.php'
cs-uri-query|contains:
- 'action=pmpro_stripe_create_webhook'
cs-method|contains:
- 'POST'
sc-status|startswith:
- '2'
selection_user:
User|contains:
- 'subscriber'
condition: selection AND selection_user
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-4100 | Auth Bypass | Paid Memberships Pro plugin for WordPress versions <= 3.6.5 |
| CVE-2026-4100 | Auth Bypass | Missing capability checks on AJAX handlers: wp_ajax_pmpro_stripe_create_webhook, wp_ajax_pmpro_stripe_delete_webhook, wp_ajax_pmpro_stripe_rebuild_webhook |
| CVE-2026-4100 | Disruption of Service | Authenticated attackers with Subscriber-level access can delete, create, or rebuild Stripe webhooks |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 02, 2026 at 15:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.