Description
The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.9.8.2. This is due to missing nonce validation on the membership request management page (approve and decline actions). This makes it possible for unauthenticated attackers to approve or deny group membership requests via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2026-03-07
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized group membership modification
Action: Update Plugin
AI Analysis

Impact

This vulnerability is a cross‑site request forgery flaw that allows an unauthenticated attacker to cause an administrator to approve or deny user requests to join a group. The flaw exists because the plugin’s membership request management page does not validate a required nonce token. If an attacker can entice an admin to click a crafted link, the admin’s browser will send a forged request that changes the approval state, potentially giving a malicious user access to restricted group content.

Affected Systems

The issue affects the WordPress plugin ProfileGrid – User Profiles, Groups and Communities. All versions up to and including 5.9.8.2 are vulnerable; newer releases are not mentioned in the advisory.

Risk and Exploitability

The CVSS base score of 4.3 indicates moderate severity, but the EPSS score of less than 1% shows a low likelihood of exploitation under normal circumstances. The vulnerability requires social engineering, as the attacker must persuade a site administrator to perform a specific action, such as clicking a link. Even with edge‑case exploitation, the damage is limited to unauthorized group membership decisions rather than arbitrary code execution or data exfiltration. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog.

Generated by OpenCVE AI on April 15, 2026 at 19:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to the latest ProfileGrid plugin version (5.9.8.3 or newer) to eliminate the CSRF flaw.
  • If an update cannot be applied immediately, restrict the use of administrative accounts and apply additional authentication checks on the approval and decline actions.
  • Enable monitoring or alerts for abnormal approval/denial activity to detect potential abuse.

Generated by OpenCVE AI on April 15, 2026 at 19:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Metagauss
Metagauss profilegrid – User Profiles, Groups And Communities
Wordpress
Wordpress wordpress
Vendors & Products Metagauss
Metagauss profilegrid – User Profiles, Groups And Communities
Wordpress
Wordpress wordpress

Sat, 07 Mar 2026 02:15:00 +0000

Type Values Removed Values Added
Description The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.9.8.2. This is due to missing nonce validation on the membership request management page (approve and decline actions). This makes it possible for unauthenticated attackers to approve or deny group membership requests via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title ProfileGrid <= 5.9.8.2 - Cross-Site Request Forgery to Group Membership Request Approval/Denial
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Metagauss Profilegrid – User Profiles, Groups And Communities
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:59:02.356Z

Reserved: 2026-02-13T21:16:27.567Z

Link: CVE-2026-2494

cve-icon Vulnrichment

Updated: 2026-03-09T19:00:18.419Z

cve-icon NVD

Status : Deferred

Published: 2026-03-07T02:16:12.787

Modified: 2026-04-22T21:27:27.950

Link: CVE-2026-2494

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T20:00:06Z

Weaknesses