CVE-2026-4283
Received Received - Intake
Unauthorized Account Destruction in WP DSGVO Tools via AJAX Abuse

Publication date: 2026-03-24

Last updated on: 2026-03-24

Assigner: Wordfence

Description
The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized account destruction in all versions up to, and including, 3.1.38. This is due to the `super-unsubscribe` AJAX action accepting a `process_now` parameter from unauthenticated users, which bypasses the intended email-confirmation flow and immediately triggers irreversible account anonymization. This makes it possible for unauthenticated attackers to permanently destroy any non-administrator user account (password randomized, username/email overwritten, roles stripped, comments anonymized, sensitive usermeta wiped) by submitting the victim's email address with `process_now=1`. The nonce required for the request is publicly available on any page containing the `[unsubscribe_form]` shortcode.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-24
Last Modified
2026-03-24
Generated
2026-05-06
AI Q&A
2026-03-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
shapepress wp_dsgvo_tools to 3.1.38 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "The vulnerability in the WP DSGVO Tools (GDPR) plugin for WordPress, up to version 3.1.38, allows unauthenticated attackers to permanently destroy any non-administrator user account. This happens because the 'super-unsubscribe' AJAX action accepts a 'process_now' parameter from unauthenticated users, bypassing the intended email confirmation step."}, {'type': 'paragraph', 'content': "By submitting the victim's email address along with 'process_now=1', an attacker can immediately trigger irreversible account anonymization. This anonymization process randomizes the password, overwrites the username and email, strips user roles, anonymizes comments, and wipes sensitive user metadata."}, {'type': 'paragraph', 'content': "The nonce (security token) required for the request is publicly available on any page containing the '[unsubscribe_form]' shortcode, making it accessible to attackers without authentication."}] [2, 4]


How can this vulnerability impact me? :

This vulnerability can have severe impacts by allowing attackers to irreversibly destroy user accounts on your WordPress site without any authentication.

  • Permanent anonymization of user accounts, including password randomization and removal of identifying information.
  • Loss of user roles and permissions, which can disrupt site functionality and user access.
  • Anonymization of user comments and wiping of sensitive user metadata, potentially affecting content integrity and user data.
  • Since administrators are excluded from this attack, the impact is limited to non-administrator users, but still poses a significant risk to user data and site trust.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability negatively affects compliance with data protection regulations such as GDPR and potentially HIPAA by allowing unauthorized and irreversible deletion or anonymization of user data without proper consent or verification.

The intended email confirmation flow, which is a safeguard to ensure that only legitimate users can request data deletion, is bypassed. This undermines the principle of user consent and control over personal data.

Moreover, the ability for unauthenticated attackers to trigger data destruction could lead to violations of data integrity and availability requirements mandated by these regulations.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "This vulnerability can be detected by monitoring for unauthorized AJAX POST requests to the WordPress AJAX endpoint that invoke the 'super-unsubscribe' action with the 'process_now=1' parameter from unauthenticated users. Such requests include the victim's email address and bypass the intended email confirmation flow, immediately triggering irreversible account anonymization."}, {'type': 'paragraph', 'content': "To detect exploitation attempts on your system or network, you can look for HTTP POST requests to the URL path '/wp-admin/admin-ajax.php' with parameters including 'action=super-unsubscribe' and 'process_now=1'."}, {'type': 'paragraph', 'content': 'Example commands to detect such attempts in web server logs (e.g., Apache or Nginx) include:'}, {'type': 'list_item', 'content': "Using grep to find suspicious requests in access logs: grep -i 'admin-ajax.php' /var/log/apache2/access.log | grep 'action=super-unsubscribe' | grep 'process_now=1'"}, {'type': 'list_item', 'content': "Using tcpdump or tshark to capture HTTP POST requests containing 'super-unsubscribe' and 'process_now=1' parameters."}, {'type': 'list_item', 'content': "Monitoring WordPress AJAX request logs or enabling detailed logging for AJAX actions to identify unauthorized 'super-unsubscribe' calls."}, {'type': 'paragraph', 'content': 'Additionally, monitoring for unexpected account anonymization or deletion events, especially for non-administrator users, may indicate exploitation.'}] [2, 4]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'Immediate mitigation steps include:'}, {'type': 'list_item', 'content': 'Update the WP DSGVO Tools (GDPR) plugin to a version later than 3.1.38 where this vulnerability is fixed.'}, {'type': 'list_item', 'content': "If an update is not immediately possible, restrict access to the AJAX action 'super-unsubscribe' by implementing firewall rules or web application firewall (WAF) rules to block unauthenticated requests containing 'process_now=1'."}, {'type': 'list_item', 'content': "Disable or remove the '[unsubscribe_form]' shortcode from publicly accessible pages to prevent exposure of the nonce and reduce attack surface."}, {'type': 'list_item', 'content': "Monitor logs for suspicious 'super-unsubscribe' AJAX requests and respond promptly to any detected exploitation attempts."}, {'type': 'paragraph', 'content': 'Administrators should also review user accounts for unexpected anonymization or deletion and restore affected accounts from backups if necessary.'}] [2, 4, 1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart