Description
The User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registration plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'WPUF_Admin_Settings::check_filetype_and_ext' function and in the 'Admin_Tools::check_filetype_and_ext' function in all versions up to, and including, 4.2.8. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Published: 2026-02-26
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Immediately
AI Analysis

Impact

The User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registration plugin for WordPress is vulnerable because the functions WPUF_Admin_Settings::check_filetype_and_ext and Admin_Tools::check_filetype_and_ext perform incorrect file type validation. This allows an authenticated user with Author-level permissions or higher to upload arbitrary files to the server. By uploading a malicious file such as a PHP script or web shell, a threat actor can potentially execute code on the system. The flaw is classified as CWE-434, uncategorized file upload.

Affected Systems

WordPress sites that have installed any version of the plugin up to and including 4.2.8 are affected. This includes deployments that have the wedevs:User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registration plugin active. Administrators, editors, or any user with Author role can exploit the flaw.

Risk and Exploitability

The CVSS score of 8.8 indicates a high severity vulnerability, while the EPSS score of less than 1% suggests a very low probability of exploitation at the time of analysis. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires only that an attacker obtain Author-level or higher access to the site, a privilege level commonly granted to site contributors. The attacker can then use the plugin’s upload interface to place a crafted file onto the server, potentially leading to remote code execution. The attack vector is likely local through the WordPress admin interface and does not require external network exposure.

Generated by OpenCVE AI on April 15, 2026 at 20:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the User Frontend plugin to the latest release that removes the insecure file type validation.
  • Configure the plugin’s file upload settings to accept only a strict set of safe file types (e.g., images or PDFs) and disable execution permissions on uploaded files.
  • Audit user roles and restrict Author-level access to only trusted contributors; consider removing Author role for sites that do not need it.

Generated by OpenCVE AI on April 15, 2026 at 20:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Wedevs
Wedevs user Frontend: Ai Powered Frontend Posting, User Directory, Profile, Membership & User Registration
Wordpress
Wordpress wordpress
Vendors & Products Wedevs
Wedevs user Frontend: Ai Powered Frontend Posting, User Directory, Profile, Membership & User Registration
Wordpress
Wordpress wordpress

Thu, 26 Feb 2026 20:00:00 +0000

Type Values Removed Values Added
Description The User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registration plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'WPUF_Admin_Settings::check_filetype_and_ext' function and in the 'Admin_Tools::check_filetype_and_ext' function in all versions up to, and including, 4.2.8. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Title User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registration <= 4.2.8 - Authenticated (Author+) Arbitrary File Upload
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wedevs User Frontend: Ai Powered Frontend Posting, User Directory, Profile, Membership & User Registration
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:43:50.370Z

Reserved: 2026-01-28T20:11:57.607Z

Link: CVE-2026-1565

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-02-26T20:31:34.317

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1565

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T20:15:13Z

Weaknesses