CVE-2026-2488
Received Received - Intake
Unauthorized Message Deletion in ProfileGrid WordPress Plugin

Publication date: 2026-03-07

Last updated on: 2026-03-07

Assigner: Wordfence

Description
The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to unauthorized message deletion due to a missing capability check on the pg_delete_msg() function in all versions up to, and including, 5.9.8.1. This is due to the function not verifying that the requesting user has permission to delete the targeted message. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary messages belonging to any user by sending a direct request with a valid message ID (mid parameter).
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-07
Last Modified
2026-03-07
Generated
2026-05-07
AI Q&A
2026-03-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
profilegrid profilegrid_user_profiles_groups_and_communities to 5.9.8.1 (inc)
profilegrid profilegrid_user_profiles_groups_and_communities to 5.9.7.1 (inc)
profilegrid profilegrid_user_profiles_groups_and_communities 5.9.8.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress has a vulnerability in all versions up to and including 5.9.8.1 where the function pg_delete_msg() does not check if the user has permission to delete a message.

Because of this missing capability check, any authenticated user with Subscriber-level access or higher can delete arbitrary messages belonging to any user by sending a direct request with a valid message ID.


How can this vulnerability impact me? :

This vulnerability allows authenticated users with low-level access (Subscriber and above) to delete messages that do not belong to them.

The impact is limited to message integrity, as attackers can remove arbitrary messages, potentially disrupting communication or deleting important information.

The CVSS v3.1 base score is 4.3, indicating a low to medium severity with no confidentiality or availability impact but with integrity impact.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability allows authenticated users with Subscriber-level access or higher to delete arbitrary messages by sending a direct request with a valid message ID (mid parameter) to the vulnerable function pg_delete_msg().'}, {'type': 'paragraph', 'content': "Detection can be performed by monitoring HTTP requests to the WordPress site for suspicious POST or AJAX requests targeting the message deletion endpoint, especially those including the 'mid' parameter."}, {'type': 'paragraph', 'content': 'Since the vulnerability involves unauthorized message deletion via AJAX calls, you can look for unusual or unexpected AJAX requests that delete messages without proper authorization.'}, {'type': 'list_item', 'content': "Use web server access logs to search for requests containing 'mid=' parameter in POST data or query strings to the ProfileGrid plugin endpoints."}, {'type': 'list_item', 'content': 'Example command to search Apache/Nginx logs for suspicious message deletion attempts:'}, {'type': 'list_item', 'content': "grep -i 'mid=' /var/log/apache2/access.log"}, {'type': 'list_item', 'content': "grep -i 'mid=' /var/log/nginx/access.log"}, {'type': 'paragraph', 'content': 'Additionally, monitoring AJAX requests in browser developer tools or using network monitoring tools to detect unauthorized message deletion attempts can help.'}, {'type': 'paragraph', 'content': 'Look for failed or successful AJAX calls to the message deletion endpoint without proper nonce or capability checks, which were missing in vulnerable versions.'}] [4]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to update the ProfileGrid – User Profiles, Groups and Communities WordPress plugin to version 5.9.8.2 or later, where the vulnerability has been fixed.

The update includes strict authorization checks, nonce verification for CSRF protection, input sanitization, and secure AJAX handling to prevent unauthorized message deletion.

If updating immediately is not possible, consider temporarily restricting access to the message deletion AJAX endpoint to trusted users only or disabling the messaging feature until the patch can be applied.

Monitor logs for suspicious activity as described in detection steps and alert administrators if unauthorized deletion attempts are detected.

Ensure that user roles and permissions are properly configured to minimize the risk of abuse by lower-privileged users.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart