CVE-2025-13416
Unknown Unknown - Not Provided
Unauthorized User Suspension in ProfileGrid WordPress Plugin

Publication date: 2026-02-05

Last updated on: 2026-02-05

Assigner: Wordfence

Description
The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to unauthorized user suspension due to a missing capability check on the pm_deactivate_user_from_group() function in all versions up to, and including, 5.9.7.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to suspend arbitrary users from groups, including administrators, via the pm_deactivate_user_from_group AJAX action.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-05
Last Modified
2026-02-05
Generated
2026-05-07
AI Q&A
2026-02-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
profilegrid profilegrid to 5.9.7.2 (inc)
profilegrid profilegrid 5.9.7.3
profilegrid profilegrid 5.9.6.5
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress has a vulnerability in all versions up to and including 5.9.7.2 where there is a missing capability check in the function pm_deactivate_user_from_group().

This flaw allows authenticated users with Subscriber-level access or higher to suspend arbitrary users from groups, including administrators, by exploiting the pm_deactivate_user_from_group AJAX action without proper authorization.

The vulnerability arises because the plugin does not verify if the user has the right permissions before suspending other users from groups.

This issue was fixed in version 5.9.7.3 by adding strict authorization checks and sanitization to prevent unauthorized user suspension and profile modifications.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker with minimal privileges (Subscriber-level or above) to suspend any user from groups within the WordPress site, including administrators.

Such unauthorized suspension can disrupt group memberships, potentially locking out legitimate users or administrators from group functionalities.

This could lead to denial of service for group-based features, administrative disruption, and potential loss of control over user group management.

While the vulnerability does not directly affect confidentiality or availability of the entire site, it does impact the integrity of group membership management.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves unauthorized user suspension via the AJAX action pm_deactivate_user_from_group, exploitable by authenticated users with Subscriber-level access and above.

To detect exploitation attempts on your system or network, you can monitor HTTP requests targeting the AJAX endpoint that handles the pm_deactivate_user_from_group action.

Specifically, look for POST requests to the WordPress admin-ajax.php URL with the parameter action=pm_deactivate_user_from_group.

Example command using command-line tools to detect such requests in web server logs (assuming Apache logs):

  • grep 'admin-ajax.php' /var/log/apache2/access.log | grep 'action=pm_deactivate_user_from_group'

Alternatively, if you have network traffic capture tools like tcpdump or Wireshark, you can filter HTTP POST requests containing the action parameter.

  • tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep 'action=pm_deactivate_user_from_group'

Monitoring WordPress user suspension logs or audit logs for unexpected suspensions of users, especially administrators, may also help detect exploitation.


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to update the ProfileGrid – User Profiles, Groups and Communities plugin to version 5.9.7.3 or later, which includes fixes for this vulnerability by enforcing proper authorization checks.

If immediate updating is not possible, consider temporarily restricting access to the AJAX action pm_deactivate_user_from_group by disabling or blocking it via web application firewall (WAF) rules or server configuration.

Additionally, review user roles and permissions to ensure that only trusted users have Subscriber-level access or higher, minimizing the risk of exploitation.

Monitor logs for suspicious activity related to user suspensions and unauthorized AJAX requests as a temporary detection measure.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart