Description
The New User Approve plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on multiple REST API endpoints in all versions up to, and including, 3.2.2. This makes it possible for unauthenticated attackers to approve or deny user accounts, retrieve sensitive user information including emails and roles, and force logout of privileged users.
Published: 2026-01-28
Score: 7.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass / Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

The New User Approve plugin for WordPress allows an attacker without any credentials to modify user account status and obtain sensitive information. The vulnerability is caused by missing authorization checks on multiple REST API endpoints in all releases up to and including 3.2.2. An unauthenticated user can send requests to approve or deny user accounts, retrieve user emails and roles, and trigger forced logouts of privileged users. This enables the attacker to alter platform integrity, leak confidential user data, and disrupt user availability.

Affected Systems

The affected product is the WordPress plugin New User Approve developed by saadiqbal. All plugin versions up to 3.2.2 are vulnerable. Sites that install or update to any of these versions are at risk unless mitigated.

Risk and Exploitability

The CVSS base score is 7.3, indicating a high severity vulnerability, while the EPSS probability is less than 1%, suggesting a low but non‑zero likelihood of exploitation. The flaw is not listed in the CISA KEV catalog. Because the vulnerable endpoints are reachable over the network via standard WordPress REST API calls, an attacker can trigger the exploit from any location that can reach the site, with no authentication or special privileges required. The overall exposure is moderate due to the low exploitation probability but remains significant because of the potential for unauthorized account manipulation and data disclosure.

Generated by OpenCVE AI on April 15, 2026 at 17:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest version of the New User Approve plugin (3.2.3 or later) or uninstall the plugin if it is no longer needed.
  • If a patch cannot be applied immediately, block or shield the plugin’s REST API endpoints using a firewall or whitelist based on authentication status, ensuring that only authenticated users can access them.
  • After patch or endpoint restriction, verify that capability checks are enforced by testing the endpoints with authenticated and unauthenticated requests, and confirm that no unauthorized account changes or data retrievals are possible.

Generated by OpenCVE AI on April 15, 2026 at 17:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 29 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 28 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 28 Jan 2026 07:00:00 +0000

Type Values Removed Values Added
Description The New User Approve plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on multiple REST API endpoints in all versions up to, and including, 3.2.2. This makes it possible for unauthenticated attackers to approve or deny user accounts, retrieve sensitive user information including emails and roles, and force logout of privileged users.
Title New User Approve <= 3.2.2 - Missing Authorization to Unauthenticated Arbitrary User Approval, Denial, and Information Disclosure
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:33:57.702Z

Reserved: 2026-01-09T21:21:53.121Z

Link: CVE-2026-0832

cve-icon Vulnrichment

Updated: 2026-01-28T14:47:50.610Z

cve-icon NVD

Status : Deferred

Published: 2026-01-28T07:16:00.320

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0832

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T18:00:15Z

Weaknesses