CVE-2026-0832
HIGHCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
2Tags
Description
The New User Approve plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on multiple REST API endpoints in all versions up to, and including, 3.2.2. This makes it possible for unauthenticated attackers to approve or deny user accounts, retrieve sensitive user information including emails and roles, and force logout of privileged users.
Analysis
New User Approve (WordPress plugin) versions up to 3.2.2. is affected by missing authorization (CVSS 7.3).
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Audit all installations of New User Approve plugin and document affected versions; disable the plugin if business-critical functionality can be deferred. Within 7 days: Implement compensating controls via WAF rules to restrict unauthorized access to plugin administrative functions; review user approval logs for suspicious activity. …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today