CVE-2026-7641: CWE-269 Improper Privilege Management in carazo Import and export users and customers
CVE-2026-7641 is a high-severity privilege escalation vulnerability in the 'Import and export users and customers' WordPress plugin by carazo, affecting all versions up to 2. 0. 8. The flaw arises from improper privilege management in multisite WordPress environments, where capability meta keys for subsites are not properly blocked. Authenticated users with Subscriber-level access or higher can exploit this by submitting crafted profile updates, potentially escalating their privileges to Administrator on any subsite. Exploitation requires prior import of a CSV with multisite-prefixed capability columns and enabling the 'Show fields in profile? ' option, which exposes these keys as editable fields. No official patch or remediation guidance is currently available.
AI Analysis
Technical Summary
The vulnerability in the 'Import and export users and customers' WordPress plugin stems from an incomplete blocklist in the save_extra_user_profile_fields() function. While capability meta keys for the primary site are correctly restricted, equivalent keys for subsites in a WordPress Multisite network (e.g., wp_2_capabilities) are not blocked. This allows these keys to bypass the in_array() check and be written directly to user meta via update_user_meta(), enabling privilege escalation. Attackers with Subscriber-level access can escalate to Administrator on any subsite by submitting crafted profile updates to /wp-admin/profile.php. Successful exploitation depends on an administrator having previously imported a CSV containing multisite-prefixed capability columns and enabling the 'Show fields in profile?' option, which stores these keys in the acui_columns option and exposes them as editable profile fields.
Potential Impact
An authenticated user with Subscriber-level or higher access can escalate their privileges to Administrator on any subsite within a WordPress Multisite network. This leads to full control over the subsite, including the ability to modify content, settings, and user roles, resulting in complete compromise of the affected subsite's integrity, confidentiality, and availability.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, administrators should avoid importing CSV files containing multisite-prefixed capability columns and refrain from enabling the 'Show fields in profile?' option. Additionally, restrict profile editing capabilities to trusted users only and monitor for unusual privilege changes.
CVE-2026-7641: CWE-269 Improper Privilege Management in carazo Import and export users and customers
Description
CVE-2026-7641 is a high-severity privilege escalation vulnerability in the 'Import and export users and customers' WordPress plugin by carazo, affecting all versions up to 2. 0. 8. The flaw arises from improper privilege management in multisite WordPress environments, where capability meta keys for subsites are not properly blocked. Authenticated users with Subscriber-level access or higher can exploit this by submitting crafted profile updates, potentially escalating their privileges to Administrator on any subsite. Exploitation requires prior import of a CSV with multisite-prefixed capability columns and enabling the 'Show fields in profile? ' option, which exposes these keys as editable fields. No official patch or remediation guidance is currently available.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability in the 'Import and export users and customers' WordPress plugin stems from an incomplete blocklist in the save_extra_user_profile_fields() function. While capability meta keys for the primary site are correctly restricted, equivalent keys for subsites in a WordPress Multisite network (e.g., wp_2_capabilities) are not blocked. This allows these keys to bypass the in_array() check and be written directly to user meta via update_user_meta(), enabling privilege escalation. Attackers with Subscriber-level access can escalate to Administrator on any subsite by submitting crafted profile updates to /wp-admin/profile.php. Successful exploitation depends on an administrator having previously imported a CSV containing multisite-prefixed capability columns and enabling the 'Show fields in profile?' option, which stores these keys in the acui_columns option and exposes them as editable profile fields.
Potential Impact
An authenticated user with Subscriber-level or higher access can escalate their privileges to Administrator on any subsite within a WordPress Multisite network. This leads to full control over the subsite, including the ability to modify content, settings, and user roles, resulting in complete compromise of the affected subsite's integrity, confidentiality, and availability.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, administrators should avoid importing CSV files containing multisite-prefixed capability columns and refrain from enabling the 'Show fields in profile?' option. Additionally, restrict profile editing capabilities to trusted users only and monitor for unusual privilege changes.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-05-01T16:13:55.353Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69f589f3cbff5d861095a087
Added to database: 5/2/2026, 5:21:55 AM
Last enriched: 5/2/2026, 5:36:20 AM
Last updated: 5/2/2026, 6:35:23 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.