[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-4003":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-08T20:11:31.826Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":24,"aliases":25,"duplicate_of":9,"upstream":26,"downstream":27,"duplicates":28,"related":29,"reserved_at":9,"published_at":30,"modified_at":30,"state":31,"summary":32,"references_raw":41,"kevs":91,"epss":92,"epss_history":95,"metrics":97,"affected":104},"CVE-2026-4003","The Users manager – PN plugin for WordPress is vulnerable to Privilege Escalation via Arbitrary User Meta Update in all versions up to and including 1.1.15. This is due to a flawed authorization logic check in the userspn_ajax_nopriv_server() function within the 'userspn_form_save' case. The conditional only blocks unauthenticated users when the user_id is empty, but when a non-empty user_id is supplied, execution bypasses this check entirely and proceeds to update arbitrary user meta via update_user_meta() without any authentication or authorization verification. Additionally, the nonce required for this AJAX endpoint ('userspn-nonce') is exposed to all visitors via wp_localize_script on the public wp_enqueue_scripts hook, rendering the nonce check ineffective as a security control. This makes it possible for unauthenticated attackers to update arbitrary user metadata for any user account, including the userspn_secret_token field.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-862","Missing Authorization","The product does not perform an authorization check when an actor attempts to access a resource or perform an action.","weakness","Incomplete","Class","High",[20],{"id":21,"name":22,"techniques":23},"CAPEC-665","Exploitation of Thunderbolt Protection Flaws",[],[],[],[],[],[],[],"2026-04-08T03:36:08.200Z","Received",{"cisa_kev":33,"cisa_ransomware":33,"cisa_vendor":9,"epss_severity":34,"epss_score":35,"severity":36,"severity_score":37,"severity_version":38,"severity_source":39,"severity_vector":40,"severity_status":31},false,"low",0.00423,"critical",9.8,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",[42,47,51,55,59,63,67,71,75,79,83,87],{"url":43,"sources":44,"tags":46},"https://www.wordfence.com/threat-intel/vulnerabilities/id/27bb60c1-43fa-4a18-b9ca-059535b0d5b6?source=cve",[39,45],"nvd",[],{"url":48,"sources":49,"tags":50},"https://plugins.trac.wordpress.org/browser/userspn/trunk/includes/class-userspn-ajax-nopriv.php#L233",[39,45],[],{"url":52,"sources":53,"tags":54},"https://plugins.trac.wordpress.org/browser/userspn/tags/1.0.31/includes/class-userspn-ajax-nopriv.php#L233",[39,45],[],{"url":56,"sources":57,"tags":58},"https://plugins.trac.wordpress.org/browser/userspn/trunk/includes/class-userspn-ajax-nopriv.php#L186",[39,45],[],{"url":60,"sources":61,"tags":62},"https://plugins.trac.wordpress.org/browser/userspn/tags/1.0.31/includes/class-userspn-ajax-nopriv.php#L186",[39,45],[],{"url":64,"sources":65,"tags":66},"https://plugins.trac.wordpress.org/browser/userspn/trunk/includes/class-userspn-ajax-nopriv.php#L190",[39,45],[],{"url":68,"sources":69,"tags":70},"https://plugins.trac.wordpress.org/browser/userspn/tags/1.0.31/includes/class-userspn-ajax-nopriv.php#L190",[39,45],[],{"url":72,"sources":73,"tags":74},"https://plugins.trac.wordpress.org/browser/userspn/trunk/includes/class-userspn-common.php#L168",[39,45],[],{"url":76,"sources":77,"tags":78},"https://plugins.trac.wordpress.org/browser/userspn/tags/1.0.31/includes/class-userspn-common.php#L168",[39,45],[],{"url":80,"sources":81,"tags":82},"https://plugins.trac.wordpress.org/browser/userspn/trunk/includes/class-userspn-functions-user.php#L235",[39,45],[],{"url":84,"sources":85,"tags":86},"https://plugins.trac.wordpress.org/browser/userspn/tags/1.0.31/includes/class-userspn-functions-user.php#L235",[39,45],[],{"url":88,"sources":89,"tags":90},"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3491109%40userspn&new=3491109%40userspn&sfp_email=&sfph_mail=",[39,45],[],[],{"date":93,"score":35,"percentile":94},"2026-04-08",0.62124,[96],{"date":93,"score":35,"percentile":94},[98,102],{"source":39,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":99,"cvss_v4_0":9},{"baseScore":37,"baseSeverity":100,"vectorString":40,"impactScore":37,"exploitabilityScore":101},"CRITICAL",10,{"source":45,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":103,"cvss_v4_0":9},{"baseScore":37,"baseSeverity":100,"vectorString":40,"impactScore":37,"exploitabilityScore":101},[105],{"ecosystem":9,"name":106,"vendor":107,"product":108,"cpe_part":109,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":110},"Users manager – PN","felixmartinez","users manager – pn","a",[111],{"version":112,"is_range":113,"range_type":39,"version_start":9,"version_start_type":9,"version_end":114,"version_end_type":115,"fixed_in":9},"\u003C= 1.1.15",true,"1.1.15","including"]