Description
The WP Frontend Profile plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.8. This is due to missing nonce validation on the 'update_action' function. This makes it possible for unauthenticated attackers to approve or reject user account registrations via a forged request granted they can trick an administrator into performing an action such as clicking on a link.
Published: 2026-03-06
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery allowing an unauthenticated attacker to approve or reject user account registrations by forging a request that an administrator may execute
Action: Apply Patch
AI Analysis

Impact

The WP Frontend Profile plugin for WordPress contains a CSRF vulnerability in all releases up to and including 1.3.8. The flaw stems from missing nonce validation in the 'update_action' handler, which processes account approval or rejection requests. An attacker can craft a forged request and entice an administrator into clicking a link or submitting a form, causing the targeted user account to be prematurely approved or deliberately rejected. This compromises the integrity of the user registration workflow and could be leveraged to grant unauthorized access or deny legitimate users. The weakness corresponds to CWE‑352. No confidential data is disclosed, but the integrity of account states is directly altered.

Affected Systems

The vulnerability affects WordPress installations that have the WP Frontend Profile plugin v1.3.8 or earlier configured. No specific WordPress core or other plugins are listed. Administrators using any of these plugin versions are susceptible.

Risk and Exploitability

The CVSS v3.1 score of 4.3 indicates a moderate risk, primarily due to the limited attack scope. The EPSS score is less than 1 %, suggesting low current exploitation likelihood, and the vulnerability is not identified in CISA’s KEV catalog. Exploitation requires the attacker to succeed in social‑engineering the site administrator into executing a forged request; no local or remote code execution is possible. If an administrator follows the malicious link, the plugin will process the approval or rejection without further user input, providing a straightforward attack path. Given the modest severity, the attack remains non‑destructive but can lead to premature account activation which may be leveraged in subsequent attack chains.

Generated by OpenCVE AI on April 15, 2026 at 19:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the WP Frontend Profile plugin to the latest available release (≥ 1.3.9) to restore nonce validation in the update_action routine.
  • Disable the account approval/rejection feature via the plugin's settings or add a temporary configuration file that blocks state changes until the plugin is patched.
  • Enforce an admin‑only CSRF token check by adding a custom hook that validates a nonce before processing any account approval request, ensuring that only legitimate admin actions are accepted.

Generated by OpenCVE AI on April 15, 2026 at 19:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Glowlogix
Glowlogix wp Frontend Profile
Wordpress
Wordpress wordpress
Vendors & Products Glowlogix
Glowlogix wp Frontend Profile
Wordpress
Wordpress wordpress

Fri, 06 Mar 2026 23:30:00 +0000

Type Values Removed Values Added
Description The WP Frontend Profile plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.8. This is due to missing nonce validation on the 'update_action' function. This makes it possible for unauthenticated attackers to approve or reject user account registrations via a forged request granted they can trick an administrator into performing an action such as clicking on a link.
Title WP Frontend Profile <= 1.3.8 - Cross-Site Request Forgery to Unauthorized User Account Approval or Rejection
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Glowlogix Wp Frontend Profile
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:01:12.868Z

Reserved: 2026-01-29T18:33:42.845Z

Link: CVE-2026-1644

cve-icon Vulnrichment

Updated: 2026-03-09T19:00:31.366Z

cve-icon NVD

Status : Deferred

Published: 2026-03-07T00:16:13.100

Modified: 2026-04-22T21:27:27.950

Link: CVE-2026-1644

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T20:00:06Z

Weaknesses