Impact
The Frontend Admin by DynamiApps plugin contains a flaw that allows unauthenticated users to modify critical WordPress options such as users_can_register, default_role, and admin_email. The weakness arises from missing capability checks and improper input validation in the ActionOptions::run() save handler (CWE‑862). By changing these options, an attacker could alter site registration settings, elevate user privileges, or redirect email traffic to a malicious address, undermining the confidentiality, integrity, and availability of the site.
Affected Systems
All WordPress installations that use Frontend Admin by DynamiApps up to and including version 3.28.20 are affected. The vulnerability is present in all earlier releases and is documented by the plugin vendor shabti.
Risk and Exploitability
This vulnerability can be exploited simply by submitting crafted form data to any public Frontend Admin form, without authentication. Although its EPSS score is below 1%, the CVSS score of 9.8 classifies it as critical. It is not yet listed in the CISA KEV catalog, but the lack of protection against unauthenticated option changes presents a high risk. Attacks would proceed through the public frontend interface, allowing remote modification of site configuration.
OpenCVE Enrichment