CVE-2026-0832
📋 TL;DR
The New User Approve WordPress plugin has missing capability checks on REST API endpoints, allowing unauthenticated attackers to approve/deny user registrations, retrieve sensitive user data, and force logout of privileged users. This affects all WordPress sites using the plugin up to version 3.2.2.
💻 Affected Systems
- WordPress New User Approve plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could approve malicious user registrations, gain administrative access by manipulating user roles, exfiltrate all user email addresses and personal data, and disrupt site operations by logging out legitimate administrators.
Likely Case
Attackers will harvest user email addresses for spam/phishing campaigns, approve spam user accounts, and potentially gain limited site access through approved malicious accounts.
If Mitigated
With proper network segmentation and monitoring, impact is limited to user data exposure and minor site disruption, but no full system compromise.
🎯 Exploit Status
Exploitation requires no authentication and minimal technical skill. Attackers can directly call vulnerable REST API endpoints.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.2.3 or later
Vendor Advisory: https://plugins.trac.wordpress.org/browser/new-user-approve
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'New User Approve' plugin. 4. Click 'Update Now' if available. 5. If no update available, download version 3.2.3+ from WordPress.org and manually update.
🔧 Temporary Workarounds
Disable REST API endpoints
allAdd code to WordPress theme functions.php to disable the vulnerable REST API endpoints
add_filter('rest_endpoints', function($endpoints) { unset($endpoints['/new-user-approve/v1/']); return $endpoints; });
Deactivate plugin
linuxTemporarily disable the New User Approve plugin until patched
wp plugin deactivate new-user-approve
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block requests to /wp-json/new-user-approve/v1/ endpoints
- Enable detailed logging for all REST API requests and monitor for suspicious activity
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin panel under Plugins > Installed Plugins. If version is 3.2.2 or lower, you are vulnerable.
Check Version:
wp plugin get new-user-approve --field=version
Verify Fix Applied:
After updating, verify plugin version shows 3.2.3 or higher. Test REST API endpoints return proper authentication errors.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST/GET requests to /wp-json/new-user-approve/v1/ endpoints from unauthenticated IPs
- Multiple user approval/denial events from single IP
- Burst of user data retrieval requests
Network Indicators:
- HTTP requests to /wp-json/new-user-approve/v1/approve, /wp-json/new-user-approve/v1/deny, /wp-json/new-user-approve/v1/users without authentication headers
SIEM Query:
source="web_logs" AND (uri_path="/wp-json/new-user-approve/v1/*" AND NOT (user_agent="WordPress/*" OR auth_token=*))
🔗 References
- https://plugins.trac.wordpress.org/browser/new-user-approve/tags/3.2.1/includes/end-points/mobile-api.php#L24
- https://plugins.trac.wordpress.org/browser/new-user-approve/tags/3.2.1/includes/end-points/mobile-api.php#L60
- https://plugins.trac.wordpress.org/browser/new-user-approve/trunk/includes/end-points/mobile-api.php#L24
- https://plugins.trac.wordpress.org/browser/new-user-approve/trunk/includes/end-points/mobile-api.php#L60
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3425140%40new-user-approve&new=3425140%40new-user-approve&sfp_email=&sfph_mail=
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3442291%40new-user-approve&new=3442291%40new-user-approve&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/f86a69ab-2fc5-4c84-872b-929dbec429cd?source=cve