CVE-2026-33290
Authorization Bypass in WPGraphQL updateComment Allows Self-Approval
Publication date: 2026-03-24
Last updated on: 2026-03-24
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wpgraphql | wpgraphql | to 2.10.0 (exc) |
| wpgraphql | wpgraphql | 2.10.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-33290 is an authorization bypass vulnerability in the WPGraphQL WordPress plugin versions up to 2.9.1. The flaw exists in the updateComment mutation, which allows authenticated low-privileged users, including those with custom roles that have zero capabilities, to change the moderation status of their own comments without needing the moderate_comments permission.
This means that users can self-approve their comments, bypassing the normal moderation workflows. The vulnerability arises because the authorization check is owner-based rather than field-based, allowing comment owners to update the status of their comments regardless of their moderation capabilities.
The exposed moderation states include APPROVE, HOLD, SPAM, and TRASH, and the status change is persisted directly in the WordPress comment_approved field.
How can this vulnerability impact me? :
This vulnerability allows low-privileged authenticated users to bypass comment moderation policies by self-approving their own comments.
As a result, untrusted or potentially harmful content can be published on your WordPress site without review, undermining the integrity of your comment moderation process.
The impact is an unauthorized modification of comment status, which can lead to the publication of inappropriate or malicious comments.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by testing whether low-privileged authenticated users can change the moderation status of their own comments using the WPGraphQL updateComment mutation without having the moderate_comments capability.
A proof-of-concept involves creating a user with no capabilities, posting a comment with a pending status, and then attempting to update the comment status to APPROVE via a GraphQL mutation. If the mutation succeeds and the comment status changes in the database, the vulnerability is present.
Example commands to reproduce this test in a local wp-env (Docker) environment include:
- npm install
- npm run wp-env start
- Run a WP-CLI eval script that creates a no-capability user, inserts a post and a pending comment, sets the current user, and executes the updateComment GraphQL mutation to change the comment status to APPROVE.
Observing the mutation response and the database comment_approved field will confirm if the vulnerability exists.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade the WPGraphQL plugin to version 2.10.0 or later, where this vulnerability has been patched.
Version 2.10.0 includes a fix that adds a capability check for the comment update mutation, preventing unauthorized users from changing comment moderation status.