Cyber Posture

CVE-2026-4283

Critical

Published: 24 March 2026

Published
24 March 2026
Modified
24 April 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0020 41.2th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized account destruction in all versions up to, and including, 3.1.38. This is due to the `super-unsubscribe` AJAX action accepting a `process_now` parameter from unauthenticated users, which bypasses the…

more

intended email-confirmation flow and immediately triggers irreversible account anonymization. This makes it possible for unauthenticated attackers to permanently destroy any non-administrator user account (password randomized, username/email overwritten, roles stripped, comments anonymized, sensitive usermeta wiped) by submitting the victim's email address with `process_now=1`. The nonce required for the request is publicly available on any page containing the `[unsubscribe_form]` shortcode.

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-3 requires enforcement of approved authorizations on the super-unsubscribe AJAX action to block unauthenticated access and prevent account destruction.

prevent

AC-2 establishes account management processes to protect non-administrator user accounts from unauthorized irreversible modifications like password randomization, role stripping, and metadata wiping.

prevent

AC-6 least privilege ensures unauthenticated users cannot access destructive functions like super-unsubscribe that bypass email confirmation and anonymize accounts.

Security SummaryAI

CVE-2026-4283 affects the WP DSGVO Tools (GDPR) plugin for WordPress in all versions up to and including 3.1.38. The vulnerability enables unauthorized account destruction due to the `super-unsubscribe` AJAX action, which accepts a `process_now` parameter from unauthenticated users. This bypasses the intended email-confirmation flow and immediately triggers irreversible account anonymization, stemming from a missing authorization check akin to CWE-862 (Missing Authorization).

Unauthenticated attackers can exploit this by submitting a victim's email address along with `process_now=1` via the AJAX endpoint. The required nonce is publicly available on any page containing the `[unsubscribe_form]` shortcode, making exploitation straightforward over the network with low complexity and no privileges needed. Successful attacks permanently destroy non-administrator user accounts by randomizing passwords, overwriting usernames and emails, stripping roles, anonymizing comments, and wiping sensitive usermeta, earning a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H).

References provided by the CVE point to specific vulnerable code locations in the plugin's source, including lines in `class-sp-dsgvo-ajax-action.php` (L69), `class-sp-dsgvo-data-collecter.php` (L250), `unsubscriber.php` (L24), and `unsubscribe-form-action.php` (L39) across tags/3.1.38 and trunk branches on the WordPress plugin trac repository. No explicit patch or mitigation details are detailed in the provided information.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1531 Account Access Removal Impact
Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users.
T1565.001 Stored Data Manipulation Impact
Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
Why these techniques?

The vulnerability allows unauthenticated exploitation of a public-facing WordPress plugin (T1190) to remove account access by destroying user accounts (T1531) and manipulate stored user data such as usernames, emails, and metadata (T1565.001).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References