Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.4
s2Member Plugin for WordPress Allows Attackers to Inject Malicious Code
CVE-2025-13732
Summary
The s2Member plugin for WordPress can be exploited by attackers with Contributor-level access to inject malicious code into pages, which can be executed when users visit those pages. This can lead to unauthorized actions and data theft. Update to a secure version of the plugin to prevent this vulnerability.
Original title
The s2Member – Excellent for All Kinds of Memberships, Content Restriction Paywalls & Member Access Subscriptions plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's ...
Original description
The s2Member – Excellent for All Kinds of Memberships, Content Restriction Paywalls & Member Access Subscriptions plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 's2Eot' shortcode in all versions up to, and including, 251005 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
nvd CVSS3.1
6.4
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
- https://plugins.trac.wordpress.org/browser/s2member/trunk/src/includes/classes/s...
- https://plugins.trac.wordpress.org/browser/s2member/trunk/src/includes/classes/s...
- https://plugins.trac.wordpress.org/browser/s2member/trunk/src/includes/classes/s...
- https://plugins.trac.wordpress.org/changeset/3430799
- https://www.wordfence.com/threat-intel/vulnerabilities/id/130f34d8-462a-4812-852...
Published: 19 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026