Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-3629: WordPress User Import Plugin Privilege Escalation
CVE-2026-3629: WordPress User Import Plugin Privilege Escalation
SECURITYHIGHCVE-2026-3629

CVE-2026-3629: WordPress User Import Plugin Privilege Escalation

The Import and export users and customers plugin for WordPress is vulnerable to privilege escalation in all versions up to 1.29.7, allowing authenticated...

Dylan H.

Security Team

March 22, 2026
5 min read

Affected Products

  • Import and export users and customers plugin <= 1.29.7 (WordPress)

CVE-2026-3629: WordPress User Import Plugin Privilege Escalation

A privilege escalation vulnerability has been disclosed in the popular Import and export users and customers plugin for WordPress, tracked as CVE-2026-3629 with a CVSS score of 8.1 (High). All plugin versions up to and including 1.29.7 are affected. The flaw allows an authenticated low-privileged user — such as a subscriber — to elevate their role to site administrator without any additional authorization checks.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-3629
CVSS Score8.1 (High)
CWE ClassificationCWE-269 — Improper Privilege Management
Affected PluginImport and export users and customers (WordPress)
Affected VersionsAll versions up to and including 1.29.7
Attack VectorAuthenticated (Subscriber-level or higher)
In-the-Wild ExploitationNot confirmed at time of disclosure
PublishedMarch 21, 2026

Technical Analysis

The vulnerability resides in the save_extra_user_profile_fields function within the plugin. This function is responsible for saving custom fields associated with a user's profile during updates. The core issue is that the function fails to restrict which WordPress user meta keys may be updated through the profile field inputs it processes.

WordPress stores user roles internally as a serialized entry in the wp_usermeta table under the wp_capabilities meta key. Because save_extra_user_profile_fields does not validate or blocklist sensitive meta keys, an authenticated user can craft a profile update request that writes directly to the wp_capabilities meta entry — overriding their current role assignment with any role of their choosing, including administrator.

Exploitation Path

1. Attacker registers or holds a low-privilege WordPress account (e.g., Subscriber)
 
2. Attacker crafts an HTTP POST request to the profile update endpoint,
   injecting the wp_capabilities meta key into the request body:
     wp_capabilities[administrator] = 1
 
3. The plugin's save_extra_user_profile_fields function processes the
   request without filtering sensitive meta keys
 
4. WordPress writes the attacker-controlled value to the wp_usermeta table,
   granting the attacker Administrator role
 
5. Attacker now has full administrative access to the WordPress site

Scope and Prevalence

The Import and export users and customers plugin is a widely used WordPress tool for bulk user management — importing users via CSV, exporting user lists, and synchronizing user data between systems. Its install base spans e-commerce operations, membership sites, educational platforms, and enterprise WordPress deployments.

Sites with open user registration enabled face the highest risk, as external attackers can self-register and then immediately exploit the vulnerability to escalate to administrator.


Remediation

Primary Fix: Update the Plugin

Update to a patched version of the plugin immediately:

# Via WP-CLI
wp plugin update import-users-from-csv-with-meta
 
# Verify installed version
wp plugin get import-users-from-csv-with-meta --field=version

Or update via WordPress Admin > Plugins > Installed Plugins > Import and export users and customers > Update Now.

Interim Mitigations (Pre-Patch)

If an immediate update is not possible:

  1. Disable open user registration — go to WordPress Admin > Settings > General > uncheck "Anyone can register"
  2. Deactivate the plugin until a patched version is available if user registration cannot be restricted
  3. Audit existing user accounts for unexpected administrator role assignments
  4. Deploy a WordPress WAF (Wordfence, Sucuri) with rules targeting meta key manipulation in profile updates

Detection

Identify potentially compromised accounts or active exploitation attempts:

# List all current administrator accounts via WP-CLI
wp user list --role=administrator --format=table
 
# Check for recently modified user capabilities
wp db query "SELECT user_id, meta_value FROM wp_usermeta WHERE meta_key='wp_capabilities' ORDER BY umeta_id DESC LIMIT 50;"
 
# Review server logs for profile update POSTs containing capabilities
grep "wp-login.php\|wp-admin/profile.php" /var/log/nginx/access.log | grep "POST"

Unexpected administrator accounts that were not manually provisioned should be investigated as potential indicators of exploitation.


Impact Assessment

Impact AreaDescription
Full Site TakeoverAdministrator access enables complete control over WordPress
Code ExecutionAdmins can install plugins or modify themes to execute server-side code
Data AccessFull access to user PII, order data, and content
PersistenceAttacker-created admin accounts survive plugin removal
Attack BarrierRequires at least subscriber-level account; open registration sites are most exposed

Key Takeaways

  1. CVE-2026-3629 is a CVSS 8.1 High privilege escalation in the WordPress Import and export users plugin (≤ 1.29.7)
  2. The save_extra_user_profile_fields function allows authenticated users to overwrite the wp_capabilities meta key, granting themselves any role including administrator
  3. Sites with open user registration are at highest risk — external attackers can self-register and immediately escalate
  4. Update the plugin immediately to a patched version; audit existing admin accounts for unexpected entries
  5. No confirmed in-the-wild exploitation was reported at the time of NVD disclosure on March 21, 2026

Sources

  • CVE-2026-3629 — NIST NVD
#CVE-2026-3629#WordPress#Privilege Escalation#NVD#CWE-269#Plugin Security

Related Articles

CVE-2026-25770: Wazuh Privilege Escalation to Root via Cluster Protocol File Write

A critical privilege escalation vulnerability (CVSS 9.1) in Wazuh versions 3.9.0–4.14.2 allows authenticated cluster nodes to overwrite the manager...

5 min read

WordPress Plugin Vulnerability (CVSS 10.0) Under Active

Maximum severity flaw in Modular DS WordPress plugin allows unauthenticated privilege escalation. All versions through 2.5.1 affected with active...

4 min read

CVE-2026-33875: Gematik Authenticator Authentication Flow Hijacking (CVSS 9.3)

A critical vulnerability in Gematik Authenticator prior to version 4.16.0 allows attackers to hijack authentication sessions via malicious deep links, potentially authenticating as victim users without their credentials.

5 min read
Back to all Security Alerts