Impact
The User Activity Log plugin allows an unauthenticated user to execute a limited options update by triggering the failed‑login handler. The missing capability check causes the handler to write usernames directly into the WordPress options table via update_option(). This enables the attacker to change critical options such as 'wp_user_roles' or enable user registration, effectively breaking wp‑admin access or allowing new accounts to be created. The CVSS score of 7.5 reflects the significant impact on confidentiality and integrity of the site configuration.
Affected Systems
WordPress sites running the User Activity Log plugin by solwininfotech, versions 2.2 or older.
Risk and Exploitability
The EPSS score is below 1 % and the vulnerability is not listed in CISA's KEV catalog, indicating a currently low probability of exploitation. Nevertheless, the lack of authentication and permission checks makes the attack readily possible on any exposed instance. Even without a zero‑day exploit, standard HTTP requests that induce a failed login can be used to modify options.
OpenCVE Enrichment