Simple User Registration Vulnerability (High) – CVE-2026-0844

Simple User Registration Vulnerability (High) – CVE-2026-0844

by | Jan 30, 2026 | Plugins

Attack Vectors

CVE-2026-0844 is a High-severity privilege escalation issue (CVSS 8.8) affecting the Simple User Registration plugin for WordPress (slug: wp-registration) in versions up to and including 6.7. The core risk is that an attacker does not need to be an administrator to start—an authenticated account with minimal permissions (such as Subscriber) can be enough.

The attack is carried out during a normal profile update workflow. By sending a crafted request that includes the wp_capabilities parameter, an authenticated attacker may be able to change their own role, effectively escalating privileges without needing additional approvals or user interaction.

Security Weakness

The weakness stems from insufficient restriction in the plugin’s profile_save_field function. In affected versions (Simple User Registration <= 6.7), this function does not adequately prevent lower-privileged users from submitting role-related data during a profile update.

In practical business terms, this is an authorization gap: a user who should only be able to edit basic profile details may be able to submit and persist privileged role data. That gap can undermine the trust model behind WordPress roles and permissions.

Technical or Business Impacts

If exploited, this High-severity issue can allow unauthorized administrative-level access originating from a seemingly low-risk account. That can translate quickly into high-impact outcomes, including site takeover, unauthorized changes to pages and content, manipulation of analytics or tracking scripts, and potential exposure of sensitive data stored within the WordPress environment.

For marketing directors and business owners, the downstream effects can include brand damage (defaced pages or malicious redirects), campaign disruption (landing pages changed or disabled), compliance and privacy concerns (unauthorized access to user data), and financial impact (incident response costs, lost revenue during downtime, and potential contractual penalties). Because the prerequisite is only a basic authenticated user, organizations that allow registrations or create many user accounts for partners, vendors, or temporary staff may face elevated risk.

Remediation is straightforward: update Simple User Registration to version 6.8 or a newer patched version. You can reference the CVE record here: https://www.cve.org/CVERecord?id=CVE-2026-0844.

Similar Attacks

Privilege escalation and access-control weaknesses are a common pattern in web applications and CMS ecosystems, where attackers move from a low-privileged foothold to admin-level control. While the specific mechanism in CVE-2026-0844 relates to WordPress role data in profile updates, the business consequence is similar: unauthorized users gaining control over systems and content.

For broader context on real-world incidents involving website compromise and downstream business risk, these examples illustrate how attackers can monetize or operationalize access once they gain control:

FTC v. Wyndham (data security failures and breaches)
U.S. DOJ: Charges related to hacking and business impact
WannaCry ransomware overview (operational disruption example)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers