VYPR
Medium severity4.3NVD Advisory· Published Apr 19, 2025· Updated Apr 15, 2026

CVE-2025-3284

CVE-2025-3284

Description

The User Registration & Membership – Custom Registration Form, Login Form, and User Profile plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.1.3. This is due to missing or incorrect nonce validation on the user_registration_pro_delete_account() function. This makes it possible for unauthenticated attackers to force delete users, including administrators, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Cross-Site Request Forgery in User Registration & Membership plugin <=5.1.3 allows unauthenticated attackers to force-delete any user, including admins, via forged requests.

Vulnerability

Analysis

The User Registration & Membership – Custom Registration Form, Login Form, and User Profile plugin for WordPress (versions up to and including 5.1.3) is vulnerable to Cross-Site Request Forgery (CSRF). The root cause is missing or incorrect nonce validation on the user_registration_pro_delete_account() function [1]. Nonces are one-time tokens used to verify that an action was intentionally initiated by the current user session; without them, the function does not distinguish between a legitimate request and a forged one.

Attack

Vector

An unauthenticated attacker can exploit this by crafting a forged request that triggers the account deletion endpoint. The attack requires tricking a site administrator into performing an action such as clicking a malicious link or visiting a crafted page while authenticated to the WordPress admin area [1]. There are no additional authentication requirements for the attacker—only the victim admin must have an active session.

Impact

Successful exploitation allows the attacker to force delete any user account on the WordPress site, including administrator-level accounts [1]. This can lead to complete denial of service for targeted users, loss of access, and potential site disruption if critical accounts are removed.

Mitigation

The plugin's changelog indicates the vulnerability exists in all versions up to and including 5.1.3 [1]. Users should update to the latest patched version as soon as it becomes available. No workarounds are documented; the recommended action is to apply the vendor's security update immediately.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.