Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
4.3

WordPress Login Register Plugin Allows Hackers to Inject Malicious Code

CVE-2026-1503
Summary

The WordPress Login Register plugin has a security weakness that could let hackers inject malicious code into your website. This could happen if an administrator clicks on a fake link sent by the hacker. To stay safe, update the plugin to the latest version or remove and reinstall it.

Original title
The login_register plugin for WordPress is vulnerable to Cross-Site Request Forgery to Stored Cross-Site Scripting in all versions up to, and including, 1.2.0. This is due to missing nonce validati...
Original description
The login_register plugin for WordPress is vulnerable to Cross-Site Request Forgery to Stored Cross-Site Scripting in all versions up to, and including, 1.2.0. This is due to missing nonce validation on the settings page and insufficient input sanitization and output escaping on the 'login_register_login_post' parameter. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page via a forged request granted they can trick an administrator into performing an action such as clicking on a link.
nvd CVSS3.1 4.3
Vulnerability type
CWE-352 Cross-Site Request Forgery (CSRF)
Published: 21 Mar 2026 · Updated: 21 Mar 2026 · First seen: 21 Mar 2026