Description
The Simple User Registration plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.3. This is due to insufficient restrictions on user meta values that can be supplied during registration. This makes it possible for unauthenticated attackers to register as an administrator.
Published: 2025-06-26
Score: 9.8 Critical
EPSS: 34.1% Moderate
KEV: No
Impact: Unauthorized administrative access
Action: Immediate Patch
AI Analysis

Impact

The Simple User Registration plugin for WordPress fails to restrict which user meta values can be provided during account creation, allowing an unauthenticated attacker to register an account with administrative privileges. This flaw gives the attacker full control over the WordPress site, enabling malicious configuration changes, data theft, or further exploitation of other plugins. The vulnerability is reflected in a CVSS score of 9.8, indicating critical severity.

Affected Systems

All releases of the Simple User Registration plugin from nmedia through version 6.3 are affected. This plugin is commonly used in WordPress installations that rely on third‑party registration mechanisms.

Risk and Exploitability

The exploit requires no prior authentication and can be performed by submitting a crafted registration request, making it straightforward for an attacker. An EPSS score of 0.34 suggests a moderate to high likelihood of exploitation. The vulnerability is not listed in CISA KEV, but the high CVSS and moderate‑to‑high EPSS combine to create a substantial risk of compromise. Mitigation hinges on disabling the vulnerable plugin or applying the vendor’s patch to a version beyond 6.3.

Generated by OpenCVE AI on April 22, 2026 at 17:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Simple User Registration to the latest release (>= 6.4).
  • If immediate update is impossible, temporarily deactivate the plugin to block registration until the fix can be applied.
  • Audit existing user accounts for unintended administrator roles and remove any malicious entries.

Generated by OpenCVE AI on April 22, 2026 at 17:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
References

Wed, 09 Jul 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Najeebmedia
Najeebmedia simple User Registration
CPEs cpe:2.3:a:najeebmedia:simple_user_registration:*:*:*:*:*:wordpress:*:*
Vendors & Products Najeebmedia
Najeebmedia simple User Registration

Fri, 27 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Jun 2025 02:15:00 +0000

Type Values Removed Values Added
Description The Simple User Registration plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.3. This is due to insufficient restrictions on user meta values that can be supplied during registration. This makes it possible for unauthenticated attackers to register as an administrator.
Title Simple User Registration <= 6.3 - Unauthenticated Privilege Escalation
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Najeebmedia Simple User Registration
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:20:02.002Z

Reserved: 2025-05-05T15:26:58.510Z

Link: CVE-2025-4334

cve-icon Vulnrichment

Updated: 2025-06-27T14:41:12.078Z

cve-icon NVD

Status : Modified

Published: 2025-06-26T02:15:21.173

Modified: 2026-04-08T19:24:09.097

Link: CVE-2025-4334

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T17:15:22Z

Weaknesses