Privilege Escalation in Users Manager PN Plugin for WordPress
CVE-2026-4003

9.8CRITICAL

Key Information:

Vendor

WordPress

Vendor
CVE Published:
8 April 2026

What is CVE-2026-4003?

The Users Manager PN plugin for WordPress is affected by a privilege escalation vulnerability that enables unauthenticated users to manipulate user metadata. This is facilitated by a security flaw in the authorization checks implemented in the userspn_ajax_nopriv_server() function, specifically within the 'userspn_form_save' case. The inadequacy arises when a valid user_id is provided; the security checks are bypassed, allowing for unauthorized updates to user metadata through the update_user_meta() function. Furthermore, the nonce required for AJAX requests is improperly exposed to all site visitors, undermining its role as a security control. This vulnerability permits attackers to alter sensitive user data, such as the userspn_secret_token field, creating a significant security risk.

Affected Version(s)

Users manager – PN 0 <= 1.1.15

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

HA GIA BAO
.