The Simple User Registration plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 6
Description
The Simple User Registration plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 6
AI Analyst Comment
Remediation
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
Executive Summary:
A high-severity privilege escalation vulnerability has been identified in the Simple User Registration plugin for WordPress. This flaw could allow a low-privileged attacker to gain administrative rights on an affected website. Successful exploitation could lead to a full site compromise, resulting in data theft, website defacement, or malware distribution.
Vulnerability Details
CVE-ID: CVE-2026-0844
Affected Software: WordPress Simple User Registration plugin
Affected Versions: All versions up to, and including, version 6.
Vulnerability: The vulnerability exists within the user registration and profile update functions of the plugin. An authenticated attacker with low-level privileges (such as a subscriber) can send a specially crafted request to the server. This request exploits a lack of proper authorization checks, allowing the attacker to modify their own user role and escalate their privileges to that of an administrator.
Business Impact
This is a High severity vulnerability with a CVSS score of 8.8. A successful exploit would grant an attacker full administrative control over the WordPress site. The potential consequences include theft of sensitive customer or user data, unauthorized content modification, website defacement, and the injection of malicious code to attack site visitors. This could lead to significant reputational damage, regulatory fines, and loss of customer trust.
Remediation Plan
Immediate Action:
Proactive Monitoring:
Compensating Controls:
/wp-admin/) to trusted IP addresses.Exploitation Status
Public Exploit Available: false
Analyst Notes: As of January 29, 2026, there are no known public exploits or active attacks targeting this vulnerability. However, vulnerabilities of this nature in popular WordPress plugins are highly attractive targets for threat actors. It is anticipated that proof-of-concept (PoC) exploit code could be developed and released publicly, which would significantly increase the risk of widespread attacks.
Analyst Recommendation
Given the high severity (CVSS 8.8) of this vulnerability and the potential for complete website compromise, we strongly recommend immediate action. Organizations using the affected versions of the Simple User Registration plugin should prioritize applying the vendor-supplied update without delay. While this CVE is not currently listed on the CISA KEV catalog, its critical impact necessitates treating it as an urgent threat to prevent potential exploitation.