CVE-2026-4977
Description
The UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WordPress is vulnerable to Improper Access Control in all versions up to, and including, 1.2.58 This is due to insufficient field-level permission validation in the upload_file_remove() AJAX handler where the $htmlvar parameter is not validated against a whitelist of allowed fields or checked against the field's for_admin_use property. This makes it possible for authenticated attackers, with subscriber-level access and above, to clear or reset any restricted usermeta column for their own user record, including fields marked as "For admin use only", bypassing intended field-level access restrictions.
Affected products
1- UsersWP/UsersWP – Front-end login form, User Registration, User Profile & Members Directoryllm-createRange: <=1.* up to 1.2.58
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- plugins.trac.wordpress.org/browser/userswp/tags/1.2.54/includes/class-forms.phpnvd
- plugins.trac.wordpress.org/browser/userswp/tags/1.2.54/includes/class-forms.phpnvd
- plugins.trac.wordpress.org/browser/userswp/tags/1.2.54/includes/class-meta.phpnvd
- plugins.trac.wordpress.org/browser/userswp/trunk/includes/class-forms.phpnvd
- plugins.trac.wordpress.org/browser/userswp/trunk/includes/class-forms.phpnvd
- plugins.trac.wordpress.org/browser/userswp/trunk/includes/class-meta.phpnvd
- plugins.trac.wordpress.org/changesetnvd
- www.wordfence.com/threat-intel/vulnerabilities/id/efee685c-e2cd-471b-aea9-607124df6006nvd
News mentions
1- Wordfence Intelligence Weekly WordPress Vulnerability Report (April 6, 2026 to April 12, 2026)Wordfence Blog · Apr 16, 2026