User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registration <= 4.2.8 - Missing Authorization
Description
The User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registration plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in all versions up to, and including, 4.2.8. This makes it possible for unauthenticated attackers to perform an unauthorized action.
CVSS Vector Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NTechnical Details
<=4.2.8What Changed in the Fix
Changes introduced in v4.2.9
Source Code
WordPress.org SVN# Exploitation Research Plan: CVE-2026-32485 (WP User Frontend) ## 1. Vulnerability Summary The **WP User Frontend** plugin (versions <= 4.2.8) is vulnerable to **Missing Authorization**. The vulnerability exists in the `dismiss_paypal_notice` method within the `WeDevs\Wpuf\Lib\Gateway\Paypal` clas…
Show full research plan
Exploitation Research Plan: CVE-2026-32485 (WP User Frontend)
1. Vulnerability Summary
The WP User Frontend plugin (versions <= 4.2.8) is vulnerable to Missing Authorization. The vulnerability exists in the dismiss_paypal_notice method within the WeDevs\Wpuf\Lib\Gateway\Paypal class. While the function implements a nonce check, it fails to perform a capability check (e.g., current_user_can('manage_options')). This allows any user (or unauthenticated attackers, if the hook is exposed to nopriv) to perform the unauthorized action of dismissing administrative notices by updating the wpuf_paypal_settings_notice_dismissed option in the database.
2. Attack Vector Analysis
- Endpoint:
/wp-admin/admin-ajax.php - AJAX Action:
wpuf_dismiss_paypal_notice - HTTP Method: POST
- Parameters:
action:wpuf_dismiss_paypal_noticenonce: A valid WordPress nonce for the actionwpuf_dismiss_paypal_notice.
- Authentication: The CVSS vector indicates
PR:N(Unauthenticated). This implies that either thewp_ajax_nopriv_wpuf_dismiss_paypal_noticehook is registered in the full plugin code or the nonce is obtainable and the handler is accessible. - **V
Check if your site is affected.
Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.