Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4003: CWE-862 Missing Authorization in felixmartinez Users manager – PN

0
Critical
VulnerabilityCVE-2026-4003cvecve-2026-4003cwe-862
Published: Wed Apr 08 2026 (04/08/2026, 03:36:08 UTC)
Source: CVE Database V5
Vendor/Project: felixmartinez
Product: Users manager – PN

Description

The Users manager – PN plugin for WordPress is vulnerable to Privilege Escalation via Arbitrary User Meta Update in all versions up to and including 1.1.15. This is due to a flawed authorization logic check in the userspn_ajax_nopriv_server() function within the 'userspn_form_save' case. The conditional only blocks unauthenticated users when the user_id is empty, but when a non-empty user_id is supplied, execution bypasses this check entirely and proceeds to update arbitrary user meta via update_user_meta() without any authentication or authorization verification. Additionally, the nonce required for this AJAX endpoint ('userspn-nonce') is exposed to all visitors via wp_localize_script on the public wp_enqueue_scripts hook, rendering the nonce check ineffective as a security control. This makes it possible for unauthenticated attackers to update arbitrary user metadata for any user account, including the userspn_secret_token field.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/08/2026, 04:46:41 UTC

Technical Analysis

CVE-2026-4003 affects the Users manager – PN plugin for WordPress, where the userspn_ajax_nopriv_server() function improperly authorizes requests. The conditional check only blocks unauthenticated users if the user_id parameter is empty, but if a non-empty user_id is provided, the function bypasses authorization and updates user meta data via update_user_meta() without verifying authentication or authorization. Additionally, the security nonce ('userspn-nonce') is exposed publicly through wp_localize_script on the front-end, rendering the nonce ineffective as a security control. This combination allows unauthenticated attackers to arbitrarily modify user metadata, including sensitive fields such as userspn_secret_token, resulting in privilege escalation.

Potential Impact

An unauthenticated attacker can escalate privileges by modifying arbitrary user metadata for any user account in the WordPress site running the vulnerable plugin. This can lead to full account compromise, data integrity loss, and potentially site-wide impact given the high privileges associated with user meta manipulation. The CVSS 3.1 score of 9.8 reflects the critical nature of this vulnerability with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, it is recommended to disable or remove the Users manager – PN plugin to prevent exploitation. Monitor vendor channels for updates or patches addressing this authorization flaw. Do not rely on the nonce as a security control since it is publicly exposed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-03-11T18:52:48.888Z
Cvss Version
3.1
State
PUBLISHED
Remediation Level
null

Threat ID: 69d5da2a43e2781badfbe603

Added to database: 4/8/2026, 4:31:38 AM

Last enriched: 4/8/2026, 4:46:41 AM

Last updated: 4/8/2026, 6:26:49 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses