Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total3
Critical0
High1
Medium2
Reset
Showing 1-3 of 3 records
Threat Entry Updated 2026-04-15

CVE-2026-0832 - New User Approve Plugin

The New User Approve plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on multiple REST API endpoints in all versions up to, and including, 3.2.2. This makes it possible for unauthenticated attackers to approve or deny user accounts, retrieve sensitive user information including emails and roles, and force logout of privileged users.

PLUGIN New User Approve

CVE-2026-0832

HIGH CVSS 7.3 2026-01-28
Threat Entry Updated 2025-11-19

CVE-2025-12770 - New User Approve Plugin

The New User Approve plugin for WordPress is vulnerable to unauthorized data disclosure in all versions up to, and including, 3.0.9 due to insufficient API key validation using loose equality comparison. This makes it possible for unauthenticated attackers to retrieve personally identifiable information (PII), including usernames and email addresses of users with various approval statuses via the Zapier REST API endpoints, by exploiting PHP type juggling with the api_key parameter set to "0" on sites where the Zapier API key has not been configured.

PLUGIN New User Approve

CVE-2025-12770

MEDIUM CVSS 5.3 2025-11-19
Threat Entry Updated 2024-11-21

CVE-2022-1625 - New User Approve Plugin

The New User Approve WordPress plugin before 2.4 does not have CSRF check in place when updating its settings and adding invitation codes, which could allow attackers to add invitation codes (for bypassing the provided restrictions) and to change plugin settings by tricking admin users into visiting specially crafted websites.

PLUGIN New User Approve

CVE-2022-1625

MEDIUM CVSS 4.3 2022-06-27
Scroll to top