CVE-2026-4283

WP DSGVO Tools · WP DSGVO Tools (GDPR) plugin

The WP DSGVO Tools (GDPR) plugin for WordPress allows unauthenticated attackers to permanently destroy non-administrator accounts by bypassing the email confirmation flow via AJAX.

Executive summary

A critical logic flaw in the WP DSGVO Tools plugin enables unauthenticated attackers to irreversibly delete and anonymize user accounts, leading to massive data loss.

Vulnerability

The super-unsubscribe AJAX action incorrectly accepts a process_now parameter from unauthenticated users. This bypasses the required email verification, allowing an attacker to trigger immediate account anonymization using only a victim's email address and a publicly available nonce.

Business impact

The impact is a permanent loss of user data and account access. Attackers can systematically destroy user databases, overwriting usernames and emails and stripping roles. While administrators are reportedly exempt, the reputational damage and loss of customer data for all other user tiers are severe. The CVSS score of 9.1 reflects this high impact on availability and integrity.

Remediation

Immediate Action: Update the WP DSGVO Tools (GDPR) plugin to the latest version immediately.

Proactive Monitoring: Review AJAX logs for high volumes of requests to the super-unsubscribe action, which may indicate a scripted attack against your user base.

Compensating Controls: Temporarily disable the [unsubscribe_form] shortcode or restrict access to the AJAX endpoint to authenticated users only until the patch is applied.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Immediate patching is required to protect user accounts. Organizations should also verify their backup and recovery procedures for user tables in case an attack occurs before the patch can be implemented.