ARMember WordPress Plugin Vulnerable to SQL Injection

ARMember WordPress Plugin Vulnerable to SQL Injection

The ARMember – Membership Plugin for WordPress, in all versions up to and including 4.0.60, is susceptible to a time-based blind SQL Injection. This vulnerability, tracked as CVE-2026-7649, stems from inadequate escaping of the ‘orderby’ parameter and insufficient preparation of existing SQL queries, as detailed by the National Vulnerability Database. The CVSS score for this flaw is 7.5 (HIGH), indicating significant risk.

This critical flaw enables unauthenticated attackers to inject additional SQL queries, potentially extracting sensitive data directly from the underlying database. The ‘orderby’ parameter, when exploited, provides a clear pathway for data exfiltration, bypassing standard security controls due to the plugin’s internal processing deficiencies.

Defenders must prioritize patching. This isn’t theoretical; SQL injection remains a top attack vector for a reason. Attackers, even those with limited skills, can automate exploitation to enumerate database schemas and dump user credentials or other proprietary information. The absence of authentication requirements makes this particularly dangerous, allowing broad exploitation against any exposed instance.

What This Means For You

  • If your organization uses the ARMember plugin for WordPress, you are directly exposed to unauthenticated data theft. Immediately verify your plugin version and apply the latest available patch to mitigate CVE-2026-7649. Audit your WordPress database logs for any suspicious queries or unauthorized access attempts from the past several weeks.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1190 Initial Access

CVE-2026-7649 - ARMember SQL Injection via orderby parameter

Sigma YAML — free preview
title: CVE-2026-7649 - ARMember SQL Injection via orderby parameter
id: scw-2026-05-02-ai-1
status: experimental
level: high
description: |
  Detects attempts to exploit CVE-2026-7649 in the ARMember WordPress plugin. This rule looks for SQL injection patterns within the 'orderby' parameter in requests to 'admin-ajax.php', specifically targeting the known vulnerability in versions up to 4.0.60. The presence of SQL keywords like SELECT, FROM, UNION, and functions like SLEEP or BENCHMARK, along with the 'orderby' parameter, strongly indicates an exploit attempt.
author: SCW Feed Engine (AI-generated)
date: 2026-05-02
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-7649/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: webserver
detection:
  selection:
      cs-uri-query|contains:
          - 'orderby=';
      cs-uri-query|contains:
          - 'SELECT';
      cs-uri-query|contains:
          - 'FROM';
      cs-uri-query|contains:
          - 'UNION';
      cs-uri-query|contains:
          - 'SLEEP';
      cs-uri-query|contains:
          - 'BENCHMARK';
      cs-uri-query|contains:
          - '@@version';
  selection_base:
      cs-uri|contains:
          - '/wp-admin/admin-ajax.php';
  condition: selection_base AND selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-7649 SQLi ARMember – Membership Plugin for WordPress versions <= 4.0.60
CVE-2026-7649 SQLi Vulnerable parameter: 'orderby'
CVE-2026-7649 SQLi Attack type: time-based blind SQL Injection
CVE-2026-7649 SQLi Affected component: ARMember plugin SQL query processing
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 02, 2026 at 11:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-7608 — TRENDnet TEW-821DAP Command Injection

CVE-2026-7608 — A vulnerability was detected in TRENDnet TEW-821DAP up to 1.12B01. The affected element is the function tools_diagnostic. The manipulation results in os command...

vulnerabilityCVEmedium-severitycommand-injectioncwe-77cwe-78
/SCW Vulnerability Desk /MEDIUM /5.5 /⚑ 3 IOCs /⚙ 2 Sigma

Brizy WordPress Plugin CVE-2026-5324: Unauthenticated Stored XSS

CVE-2026-5324 — The Brizy – Page Builder plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting in all versions up to, and including, 2.8.11...

vulnerabilityCVEhigh-severitycross-site-scripting-xsscwe-79
/SCW Vulnerability Desk /HIGH /7.2 /⚑ 5 IOCs /⚙ 2 Sigma

CVE-2026-4024 — The Royal Addons for Elementor plugin for WordPress is

CVE-2026-4024 — The Royal Addons for Elementor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the...

vulnerabilityCVEmedium-severitycwe-862
/SCW Vulnerability Desk /MEDIUM /5.3 /⚑ 2 IOCs /⚙ 3 Sigma