CVE-2026-22337
Received Received - Intake
Incorrect Privilege Assignment in Directorist Social Login Enables Escalation

Publication date: 2026-04-27

Last updated on: 2026-04-27

Assigner: Patchstack

Description
Incorrect Privilege Assignment vulnerability in Directorist Directorist Social Login allows Privilege Escalation.This issue affects Directorist Social Login: from n/a before 2.1.4.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-27
Last Modified
2026-04-27
Generated
2026-05-06
AI Q&A
2026-04-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
directorist directorist_social_login From 2.1.4 (inc) to 2.1.4 (exc)
directorist directorist_social_login to 2.1.4 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-22337 is a high-priority privilege escalation vulnerability in the WordPress Directorist Social Login Plugin versions prior to 2.1.4.

This flaw allows an unauthenticated attacker with low privileges to escalate their access to higher privilege levels, potentially gaining full control over the affected website.

It falls under the OWASP Top 10 category A3: Injection and is specifically classified as a privilege escalation issue.

The vulnerability was reported by the researcher 0xd4rk5id3 on November 1, 2025, and publicly disclosed on January 20, 2026.

Users are strongly advised to update to version 2.1.4 or later to mitigate this risk.


How can this vulnerability impact me? :

This vulnerability can have severe impacts as it allows attackers to escalate their privileges from low or unauthenticated access to full control over the affected website.

An attacker exploiting this flaw could compromise the website's integrity, confidentiality, and availability.

Such control could lead to unauthorized data access, modification, deletion, or disruption of website services.

Because the vulnerability is highly dangerous and expected to be exploited in mass campaigns, the risk to affected sites is critical.

Immediate remediation by updating the plugin or applying mitigation rules is essential to prevent exploitation.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability affects WordPress sites using the Directorist Social Login Plugin versions prior to 2.1.4. Detection involves identifying if the vulnerable plugin version is installed.

You can check the installed plugin version on your WordPress site by running the following command in the WordPress root directory:

  • wp plugin list | grep directorist-social-login

If the version is below 2.1.4, your site is vulnerable.

Additionally, monitoring for unusual privilege escalation attempts or suspicious activity in your web server logs may help detect exploitation attempts.

Patchstack provides mitigation rules and security monitoring tools that can help detect exploitation attempts until the plugin is updated.


What immediate steps should I take to mitigate this vulnerability?

The most immediate and effective mitigation step is to update the Directorist Social Login Plugin to version 2.1.4 or later, which contains the patch for this vulnerability.

Until you can update, you should apply mitigation rules provided by Patchstack that can block exploitation attempts.

Additionally, enable automatic updates for your WordPress plugins to ensure timely patching of vulnerabilities in the future.

Monitor your website for suspicious activity and privilege escalation attempts to detect any ongoing exploitation.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an unauthenticated attacker to escalate privileges and potentially gain full control over the affected website. Such unauthorized access and control can lead to data breaches or unauthorized data manipulation.

This type of security breach can impact compliance with common standards and regulations like GDPR and HIPAA, which require protection of sensitive data and strict access controls. Failure to prevent privilege escalation vulnerabilities may result in non-compliance due to inadequate security measures.

Therefore, organizations using affected versions of the Directorist Social Login plugin should promptly update to the patched version 2.1.4 or later to mitigate risks and maintain compliance with such regulations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart