Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13493: CWE-862 Missing Authorization in webrndexperts Latest Registered Users

0
High
VulnerabilityCVE-2025-13493cvecve-2025-13493cwe-862
Published: Wed Jan 07 2026 (01/07/2026, 08:21:54 UTC)
Source: CVE Database V5
Vendor/Project: webrndexperts
Product: Latest Registered Users

Description

The Latest Registered Users plugin for WordPress is vulnerable to unauthorized user data export in all versions up to, and including, 1.4. This is due to missing authorization and nonce validation in the rnd_handle_form_submit function hooked to both admin_post_my_simple_form and admin_post_nopriv_my_simple_form actions. This makes it possible for unauthenticated attackers to export complete user details (excluding passwords and sensitive tokens) in CSV format via the 'action' parameter.

AI-Powered Analysis

AILast updated: 01/07/2026, 08:51:53 UTC

Technical Analysis

CVE-2025-13493 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the 'Latest Registered Users' WordPress plugin developed by webrndexperts. The vulnerability exists in the rnd_handle_form_submit function, which is hooked to both admin_post_my_simple_form and admin_post_nopriv_my_simple_form WordPress actions. Due to missing authorization checks and nonce validation, unauthenticated attackers can invoke this function remotely by sending a specially crafted request with the 'action' parameter set accordingly. This allows them to export the complete list of registered users in CSV format, excluding passwords and sensitive tokens but including other user details such as usernames, email addresses, registration dates, and possibly other profile information. The vulnerability affects all plugin versions up to and including 1.4. The CVSS v3.1 base score is 7.5, reflecting high severity with network attack vector, no privileges required, no user interaction, and high confidentiality impact. The flaw does not impact integrity or availability. No patches are currently linked, and no known exploits have been observed in the wild. The vulnerability poses a significant privacy risk, especially for websites that handle sensitive user data or operate under strict data protection regulations.

Potential Impact

For European organizations, the unauthorized export of user data can lead to severe privacy breaches and non-compliance with GDPR and other regional data protection laws. Exposure of user personal information such as email addresses and registration details can facilitate targeted phishing, social engineering, and identity theft attacks. Organizations may face legal penalties, reputational damage, and loss of customer trust. Since the vulnerability requires no authentication or user interaction, it can be exploited at scale by automated tools, increasing the risk of mass data leakage. Websites using this plugin for membership or customer management are particularly vulnerable. The impact is heightened for sectors handling sensitive user data, including e-commerce, education, healthcare, and government services. Additionally, the lack of nonce validation increases the risk of Cross-Site Request Forgery (CSRF) style attacks, further complicating mitigation.

Mitigation Recommendations

1. Immediately audit WordPress sites to identify installations of the 'Latest Registered Users' plugin and determine the version in use. 2. Disable or remove the plugin if it is not essential to reduce attack surface. 3. Monitor official vendor channels and WordPress plugin repositories for patches or updates addressing CVE-2025-13493 and apply them promptly once available. 4. Implement web application firewall (WAF) rules to detect and block requests containing suspicious 'action' parameters targeting admin_post_my_simple_form and admin_post_nopriv_my_simple_form endpoints. 5. Restrict access to WordPress admin-post.php endpoints via IP whitelisting or authentication where feasible. 6. Enhance logging and alerting for unusual export or data access activities related to user data. 7. Conduct regular security assessments and penetration tests focusing on authorization controls in plugins. 8. Educate site administrators about the risks of installing unverified plugins and the importance of timely updates. 9. Consider implementing additional application-layer authorization checks for sensitive operations, even if plugins lack them. 10. Review and update privacy policies and incident response plans to address potential data breaches stemming from such vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-20T21:55:48.114Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e1b2fa55ed4ed998cb638

Added to database: 1/7/2026, 8:37:03 AM

Last enriched: 1/7/2026, 8:51:53 AM

Last updated: 1/8/2026, 6:43:46 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats