New User Approve Vulnerability (Medium) – CVE-2025-63030

New User Approve Vulnerability (Medium) – CVE-2025-63030

by | Feb 25, 2026 | Plugins

Attack Vectors

CVE-2025-63030 is a Medium-severity Cross-Site Request Forgery (CSRF) issue affecting the WordPress plugin New User Approve (slug: new-user-approve) in versions up to and including 3.2.3. The vulnerability stems from missing or incorrect nonce validation on a function, which can allow an attacker to submit a forged request.

In practical terms, the attacker does not need to be logged in to your WordPress site, but they do need to convince a site administrator to take an action such as clicking a crafted link or visiting a malicious page while authenticated to WordPress. This is commonly delivered through phishing emails, fake “urgent” admin alerts, or links embedded in otherwise legitimate-looking communications.

Security Weakness

The security weakness is the absence (or incorrect implementation) of WordPress nonce validation. Nonces are a standard safeguard used to ensure that sensitive actions performed in the admin area are intentional and originate from the legitimate site session.

When nonce checks are missing or incorrect, a browser session belonging to an authenticated administrator can be abused to send unintended requests—meaning the administrator’s privileges may be leveraged without their explicit intent.

Technical or Business Impacts

According to the CVSS score (4.3, vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N), the primary impact is limited to integrity (i.e., unauthorized changes) rather than data theft or site outage. Even so, integrity issues can create real business risk—especially on sites where user onboarding and approvals are tied to customer experience, partner access, or internal workflows.

Potential business outcomes may include administrative actions being performed without authorization, leading to process disruption, support overhead, and reputational impact if user access or approval workflows are altered unexpectedly. Compliance teams may also view unauthorized administrative changes—regardless of whether data was exfiltrated—as a control failure that warrants incident review and documentation.

Remediation: Update New User Approve to version 3.2.4 or newer, which includes a patch for this issue. Reference: CVE-2025-63030 and the vendor intelligence source at Wordfence Threat Intelligence.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers