Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1271: CWE-639 Authorization Bypass Through User-Controlled Key in metagauss ProfileGrid – User Profiles, Groups and Communities

0
Medium
VulnerabilityCVE-2026-1271cvecve-2026-1271cwe-639
Published: Thu Feb 05 2026 (02/05/2026, 09:13:45 UTC)
Source: CVE Database V5
Vendor/Project: metagauss
Product: ProfileGrid – User Profiles, Groups and Communities

Description

CVE-2026-1271 is a medium-severity vulnerability in the ProfileGrid WordPress plugin that allows authenticated users with Subscriber-level access or higher to change any user's profile or cover image without proper authorization. This occurs due to an authorization bypass in AJAX actions 'pm_upload_image' and 'pm_upload_cover_image', where update_user_meta() is called without verifying user permissions. Although it does not impact confidentiality or availability, it compromises integrity by allowing unauthorized profile modifications. The vulnerability affects all versions up to 5. 9. 7. 2. Exploitation requires authentication but no user interaction beyond login. There are no known exploits in the wild yet, and no patches have been published. European organizations using this plugin on WordPress sites, especially those with public-facing community features, should prioritize mitigation to prevent potential defacement or impersonation attacks.

AI-Powered Analysis

AILast updated: 02/05/2026, 09:45:01 UTC

Technical Analysis

CVE-2026-1271 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the ProfileGrid – User Profiles, Groups and Communities plugin for WordPress. The flaw exists in all versions up to 5.9.7.2 and is triggered via the AJAX actions 'pm_upload_image' and 'pm_upload_cover_image'. These actions call the WordPress function update_user_meta() to update profile and cover images but do so without performing proper authorization checks to confirm the requesting user's rights to modify the targeted user's metadata. As a result, any authenticated user with Subscriber-level access or higher can manipulate the profile or cover images of any other user, including administrators. This vulnerability does not expose sensitive data or disrupt service availability but undermines data integrity by allowing unauthorized changes to user profiles. The vulnerability is remotely exploitable over the network without user interaction beyond authentication. No public exploits or patches are currently available, increasing the risk of future exploitation if left unaddressed. The vulnerability's CVSS 3.1 base score is 5.3 (medium), reflecting its moderate impact and ease of exploitation by authenticated users.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity of user profile data on WordPress sites using the ProfileGrid plugin. Attackers could deface user profiles or impersonate administrators by changing profile or cover images, potentially damaging organizational reputation and trust, especially in community-driven or customer-facing platforms. While it does not directly compromise confidential information or availability, unauthorized profile modifications could facilitate social engineering or phishing attacks by misleading users about the identity or authority of individuals within the organization. Organizations relying on WordPress for internal collaboration or customer engagement may face increased risk of reputational harm and user confusion. The impact is heightened for sectors with strict compliance or brand protection requirements, such as finance, healthcare, and government entities operating in Europe.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the use of the ProfileGrid plugin and verify the version in use. Until an official patch is released, administrators should consider the following specific mitigations: 1) Restrict plugin usage to trusted users only and limit Subscriber-level access where possible; 2) Implement additional access control measures at the web server or application firewall level to block unauthorized AJAX requests targeting 'pm_upload_image' and 'pm_upload_cover_image' endpoints; 3) Monitor logs for suspicious profile image update attempts originating from non-administrative accounts; 4) Temporarily disable or deactivate the ProfileGrid plugin if feasible to eliminate exposure; 5) Engage with the plugin vendor or community to track patch releases and apply updates promptly; 6) Educate users about the risk of profile impersonation and encourage reporting of suspicious profile changes; 7) Employ multi-factor authentication to reduce the risk of compromised accounts being used to exploit this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-20T21:46:58.650Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69846323f9fa50a62f145d30

Added to database: 2/5/2026, 9:30:11 AM

Last enriched: 2/5/2026, 9:45:01 AM

Last updated: 2/5/2026, 10:33:35 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats