Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2488: CWE-862 Missing Authorization in metagauss ProfileGrid – User Profiles, Groups and Communities

0
Medium
VulnerabilityCVE-2026-2488cvecve-2026-2488cwe-862
Published: Sat Mar 07 2026 (03/07/2026, 01:21:21 UTC)
Source: CVE Database V5
Vendor/Project: metagauss
Product: ProfileGrid – User Profiles, Groups and Communities

Description

The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to unauthorized message deletion due to a missing capability check on the pg_delete_msg() function in all versions up to, and including, 5.9.8.1. This is due to the function not verifying that the requesting user has permission to delete the targeted message. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary messages belonging to any user by sending a direct request with a valid message ID (mid parameter).

AI-Powered Analysis

AILast updated: 03/07/2026, 20:34:15 UTC

Technical Analysis

CVE-2026-2488 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the ProfileGrid – User Profiles, Groups and Communities plugin for WordPress in all versions up to and including 5.9.8.1. The vulnerability stems from the pg_delete_msg() function lacking a capability check to verify if the user requesting message deletion has the appropriate permissions. As a result, any authenticated user with Subscriber-level access or higher can delete arbitrary messages by sending a direct HTTP request containing a valid message ID (mid parameter). This bypasses intended access controls, allowing unauthorized message deletion across user accounts. The vulnerability does not require user interaction beyond the crafted request and has a low attack complexity. It does not affect confidentiality or availability but impacts the integrity of user messages. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. The vulnerability affects a widely used WordPress plugin that manages user profiles, groups, and communities, making it relevant to many websites relying on this plugin for social or community features.

Potential Impact

The primary impact of CVE-2026-2488 is the unauthorized deletion of messages within the ProfileGrid plugin, compromising the integrity of user communications. This can lead to loss of important user-generated content, disruption of community interactions, and potential user distrust in platforms relying on this plugin. While it does not expose sensitive data or cause denial of service, the ability for low-privileged authenticated users to manipulate other users' messages can be leveraged for harassment, censorship, or sabotage within community sites. Organizations operating WordPress sites with ProfileGrid installed may face reputational damage and user dissatisfaction if this vulnerability is exploited. The impact is more pronounced for sites with active user communities, forums, or social networking features where message integrity is critical. Since exploitation requires authentication, the threat is limited to registered users but remains significant given the ease of exploitation and the broad user base of WordPress.

Mitigation Recommendations

To mitigate CVE-2026-2488, organizations should first check for and apply any official patches or updates released by the ProfileGrid plugin developers once available. In the absence of a patch, administrators can implement the following specific measures: 1) Restrict plugin usage to trusted users by limiting registration or disabling message deletion capabilities for Subscriber-level users via custom role permissions or capability management plugins. 2) Employ Web Application Firewalls (WAFs) to detect and block suspicious requests targeting the pg_delete_msg() function, especially those attempting to delete messages with arbitrary message IDs. 3) Monitor logs for unusual message deletion activity, particularly from low-privileged accounts, to detect potential exploitation attempts. 4) Consider temporarily disabling message deletion features or the plugin itself if message integrity is critical and no immediate patch is available. 5) Review and harden user role assignments to ensure minimal privileges are granted to users who do not require message deletion capabilities. These targeted mitigations go beyond generic advice by focusing on access control tightening, monitoring, and WAF rule implementation specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-13T21:00:10.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ac8b60c48b3f10ffc6f686

Added to database: 3/7/2026, 8:32:32 PM

Last enriched: 3/7/2026, 8:34:15 PM

Last updated: 3/8/2026, 2:09:08 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses