CVE-2026-6203 PUBLISHED

User Registration & Membership <= 5.1.4 - Unauthenticated Open Redirect via 'redirect_to_on_logout' Parameter

Assigner: Wordfence
Reserved: 13.04.2026 Published: 13.04.2026 Updated: 14.04.2026

The User Registration & Membership plugin for WordPress is vulnerable to Open Redirect in versions up to and including 5.1.4. This is due to insufficient validation of user-supplied URLs passed via the 'redirect_to_on_logout' GET parameter before redirecting users. The redirect_to_on_logout GET parameter is passed directly to WordPress's wp_redirect() function instead of the domain-restricted wp_safe_redirect(). While esc_url_raw() is applied to sanitize malformed URLs, it does not restrict the redirect destination to the local domain, allowing an attacker to craft a specially formed link that redirects users to potentially malicious external URLs after logout, which could be used to facilitate phishing attacks.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS Score: 6.1

Product Status

Vendor wpeverest
Product User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder
Versions Default: unaffected
  • affected from 0 to 5.1.4 (incl.)

Credits

  • Anthony Cihan finder

References

Problem Types

  • CWE-601 URL Redirection to Untrusted Site ('Open Redirect') CWE