Description
The User Activity Log WordPress plugin through 2.2 does not properly handle failed login attempts in some cases, allowing unauthenticated users to set arbitrary options to 1 (for example to enable User Registration when it has been turned off)
Published: 2026-01-28
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Configuration Change
Action: Immediate Patch
AI Analysis

Impact

The User Activity Log WordPress plugin versions up to 2.2 contains a flaw that allows an unauthenticated user to influence configuration values during the processing of failed login attempts. An attacker can set arbitrary options to the value "1", for example turning User Registration on when it has been disabled. This grants the attacker the ability to change site settings without authorization, potentially enabling unwanted user accounts. The weakness involves improper input validation and configuration manipulation, corresponding to CWE‑639.

Affected Systems

WordPress sites running the User Activity Log plugin version 2.2 or earlier are affected. The plugin is identified as "Unknown:User Activity Log" in CNA records, with no specific vendor listed.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. The EPSS score of less than 1% shows a very low likelihood of exploitation. The vulnerability is not listed in CISA’s KEV catalog. An unauthenticated user can exploit the flaw by triggering a failed login attempt that reaches the plugin’s option update logic. No advanced privileges or additional conditions are required beyond sending HTTP requests to the site.

Generated by OpenCVE AI on April 27, 2026 at 21:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update User Activity Log to the latest version (above 2.2) released by the vendor.
  • If an update is unavailable, temporarily disable the plugin to block unauthenticated access to the configuration interface.
  • Review and restrict the plugin’s configuration settings after restoring access, ensuring User Registration remains disabled if desired.

Generated by OpenCVE AI on April 27, 2026 at 21:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-639

Thu, 29 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 28 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 28 Jan 2026 06:15:00 +0000

Type Values Removed Values Added
Description The User Activity Log WordPress plugin through 2.2 does not properly handle failed login attempts in some cases, allowing unauthenticated users to set arbitrary options to 1 (for example to enable User Registration when it has been turned off)
Title User Activity Log <= 2.2 - Unauthenticated Limited Arbitrary Option Update
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2026-04-02T12:39:54.086Z

Reserved: 2025-11-20T08:38:24.493Z

Link: CVE-2025-13471

cve-icon Vulnrichment

Updated: 2026-01-28T21:20:53.912Z

cve-icon NVD

Status : Deferred

Published: 2026-01-28T06:15:47.477

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13471

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T21:15:05Z

Weaknesses