Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
4.3
WP Frontend Profile plugin for WordPress: Approval of fake user accounts
CVE-2026-1644
Summary
The WP Frontend Profile plugin for WordPress allows an attacker to trick an administrator into approving or rejecting user account registrations without their knowledge. This can lead to unauthorized access to the site. Update to version 1.3.9 or later to fix the issue.
Original title
The WP Frontend Profile plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.8. This is due to missing nonce validation on the 'update_action' ...
Original description
The WP Frontend Profile plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.8. This is due to missing nonce validation on the 'update_action' function. This makes it possible for unauthenticated attackers to approve or reject user account registrations via a forged request granted they can trick an administrator into performing an action such as clicking on a link.
nvd CVSS3.1
4.3
Vulnerability type
CWE-352
Cross-Site Request Forgery (CSRF)
- https://plugins.trac.wordpress.org/browser/wp-front-end-profile/tags/1.3.8/funct...
- https://plugins.trac.wordpress.org/browser/wp-front-end-profile/trunk/functions/...
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old...
- https://www.wordfence.com/threat-intel/vulnerabilities/id/74b186fd-5825-4a20-829...
Published: 7 Mar 2026 · Updated: 13 Mar 2026 · First seen: 7 Mar 2026