Deserialization Vulnerability in User Frontend Plugin for WordPress
CVE-2026-5127

8.8HIGH

What is CVE-2026-5127?

The User Frontend Plugin for WordPress has a vulnerability that allows authenticated attackers with Subscriber-level access and above to exploit insufficient input validation on the wpuf_files parameter during form submissions. This flaw can lead to the unconditional deserialization of untrusted data, enabling attackers to inject arbitrary PHP objects. If a method of attack called a 'POP chain' exists on the target system, attackers can execute arbitrary code or delete files, leading to potential site compromise.

Affected Version(s)

User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registration 0 <= 4.3.1

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Doan Dinh Van
.