Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hw75-3wq2-7668

Опубликовано: 24 мар. 2026
Источник: github
Github: Не прошло ревью
CVSS3: 9.1

Описание

The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized account destruction in all versions up to, and including, 3.1.38. This is due to the super-unsubscribe AJAX action accepting a process_now parameter from unauthenticated users, which bypasses the intended email-confirmation flow and immediately triggers irreversible account anonymization. This makes it possible for unauthenticated attackers to permanently destroy any non-administrator user account (password randomized, username/email overwritten, roles stripped, comments anonymized, sensitive usermeta wiped) by submitting the victim's email address with process_now=1. The nonce required for the request is publicly available on any page containing the [unsubscribe_form] shortcode.

The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized account destruction in all versions up to, and including, 3.1.38. This is due to the super-unsubscribe AJAX action accepting a process_now parameter from unauthenticated users, which bypasses the intended email-confirmation flow and immediately triggers irreversible account anonymization. This makes it possible for unauthenticated attackers to permanently destroy any non-administrator user account (password randomized, username/email overwritten, roles stripped, comments anonymized, sensitive usermeta wiped) by submitting the victim's email address with process_now=1. The nonce required for the request is publicly available on any page containing the [unsubscribe_form] shortcode.

EPSS

Процентиль: 33%
0.00135
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-862

Связанные уязвимости

CVSS3: 9.1
nvd
17 дней назад

The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized account destruction in all versions up to, and including, 3.1.38. This is due to the `super-unsubscribe` AJAX action accepting a `process_now` parameter from unauthenticated users, which bypasses the intended email-confirmation flow and immediately triggers irreversible account anonymization. This makes it possible for unauthenticated attackers to permanently destroy any non-administrator user account (password randomized, username/email overwritten, roles stripped, comments anonymized, sensitive usermeta wiped) by submitting the victim's email address with `process_now=1`. The nonce required for the request is publicly available on any page containing the `[unsubscribe_form]` shortcode.

EPSS

Процентиль: 33%
0.00135
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-862