Two critical vulnerabilities have been identified in the ProfilePress plugin for WordPress, a popular tool for user registration, membership management, and profile customization. These vulnerabilities allow for arbitrary shortcode execution and unauthorized membership payment bypass. A patch, version 4.16.12, is now available to address these issues.
These vulnerabilities are rated with CVSS scores of 6.5 and 7.1, indicating significant potential impact and exploitability.
What is ProfilePress?
Arbitrary Shortcode Execution via Checkout Billing Fields
Medium severity - potential for remote code execution.
An estimated 2.9% of WordPress sites are potentially vulnerable.
This vulnerability stems from insufficient sanitization of user-supplied billing field values during the checkout process. Attackers can inject malicious shortcodes into these fields, which are then executed without proper validation, leading to arbitrary code execution.
How to fix CVE-2026-3309 in ProfilePress
Patch immediately- 1.Update ProfilePress to version 4.16.12 or later.
wp plugin update profilepressVerify with:
wp plugin status profilepressNextGuard automatically flags CVE-2026-3309 if ProfilePress appears in any of your monitored projects — no manual lookup required.
Missing Authorization to Authenticated (Subscriber+) Membership Payment Bypass
High severity - potential for unauthorized access to paid content.
An estimated 2.5% of WordPress sites are potentially vulnerable.
This vulnerability allows authenticated attackers with subscriber-level access or higher to bypass membership payment requirements. A missing ownership verification in the `change_plan_sub_id` parameter allows manipulation of proration calculations, enabling attackers to obtain paid membership plans without payment.
How to fix CVE-2026-3445 in ProfilePress
Patch immediately- 1.Update ProfilePress to version 4.16.12 or later.
wp plugin update profilepressVerify with:
wp plugin status profilepressNextGuard automatically flags CVE-2026-3445 if ProfilePress appears in any of your monitored projects — no manual lookup required.
Stay ahead of WordPress vulnerabilities
Proactively identify and address security risks in your WordPress ecosystem. monitor your wordpress dependencies to ensure your sites remain protected.
Compare Your DependenciesFrequently asked questions
The vulnerabilities in ProfilePress highlight the importance of regularly updating WordPress plugins to mitigate security risks. Ensure you apply the patch to version 4.16.12 promptly. see all wordpress vulnerabilities.
Related topics