New User Approve Vulnerability (Medium) – CVE-2025-69063

New User Approve Vulnerability (Medium) – CVE-2025-69063

by | Feb 17, 2026 | Plugins

Attack Vectors

The WordPress plugin New User Approve (slug: new-user-approve) has a Medium-severity vulnerability (CVSS 5.3) tracked as CVE-2025-69063. The issue affects all versions up to and including 3.2.0.

Because the vulnerability can be exploited by unauthenticated attackers, the attack does not require a user account, special privileges, or user interaction. In practical terms, this increases exposure for any site running a vulnerable version, especially public-facing sites where the plugin is installed.

Security Weakness

The core weakness is a missing capability (authorization) check on a plugin function. In business terms, this means the plugin does not consistently verify whether a requester is allowed to perform a particular action before executing it.

Wordfence reports that this missing authorization control enables unauthorized access that can allow an attacker to perform an unauthorized action in affected versions of New User Approve.

Technical or Business Impacts

Even at Medium severity, missing authorization checks are a meaningful risk because they can lead to unauthorized changes that disrupt normal operations. Depending on how your organization uses New User Approve, impacts may include workflow disruption around user onboarding and approval processes, added support burden, and loss of confidence in account governance controls.

For leadership and compliance teams, the larger concern is control failure: when an unauthenticated party can trigger actions that should be restricted, it can raise questions about access control maturity, audit readiness, and the reliability of user-management policies.

Remediation: Update New User Approve to version 3.2.1 or a newer patched version, per the vendor guidance reported by Wordfence: Wordfence vulnerability record.

Similar Attacks

Authorization failures in web applications are a common root cause of real-world incidents. For context, here are well-known examples of access control weaknesses being exploited or highlighted publicly:

OWASP Top 10 (2017) – Broken Access Control describes how missing or inconsistent authorization checks can enable users (or attackers) to perform actions they shouldn’t.

OWASP Top 10 (2021) – Broken Access Control continues to rank access control failures as a leading risk category because they can directly enable unauthorized actions and policy violations.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers