WordPress Import and Export Users Plugin Privilege Escalation Vulnerability
A privilege escalation vulnerability exists in the Import and export users and customers plugin for WordPress (versions <= 2.0.8) due to an incomplete blocklist allowing authenticated users to gain administrator privileges on subsites within a Multisite network.
The Import and export users and customers plugin for WordPress, a plugin used to manage user data, is vulnerable to privilege escalation. This vulnerability, identified as CVE-2026-7641, affects all versions of the plugin up to and including 2.0.8. The vulnerability stems from an incomplete blocklist in the save_extra_user_profile_fields() function. This function fails to adequately filter meta keys for subsites within a WordPress Multisite network, allowing attackers to manipulate user roles. Successful exploitation allows authenticated attackers with Subscriber-level access or higher to escalate their privileges to Administrator on any subsite within the Multisite network. Exploitation requires the targeted WordPress instance to be part of a Multisite network and have specific settings enabled.
Attack Chain
- An administrator imports a CSV file containing multisite-prefixed capability column headers (e.g.,
wp_2_capabilities) using the affected plugin. - The administrator enables the “Show fields in profile?” option within the plugin settings. This action stores the imported column headers (including the multisite capabilities) in the
acui_columnsoption. - A low-privileged user (e.g., Subscriber) authenticates to the WordPress subsite.
- The attacker navigates to their user profile page (
/wp-admin/profile.php). The plugin displays the previously imported multisite capability fields as editable options on the profile page. - The attacker crafts a profile update request, setting the value of the
wp_{subsite_id}_capabilitiesmeta key toa:1:{s:13:"administrator";b:1;}which grants administrator privileges. - The attacker submits the crafted profile update to
/wp-admin/profile.php. - The
save_extra_user_profile_fields()function processes the update. Due to the incomplete blocklist, the function fails to prevent the modification of thewp_{subsite_id}_capabilitiesmeta key. - The
update_user_meta()function writes the attacker-controlled value directly to the user’s metadata, granting them Administrator privileges on the specified subsite.
Impact
Successful exploitation of CVE-2026-7641 allows an attacker to gain complete control over a WordPress subsite within a Multisite network. This can lead to unauthorized access to sensitive data, modification of website content, installation of malicious plugins or themes, and potential compromise of the entire Multisite network. Given the widespread use of WordPress and the Import and export users and customers plugin, a successful attack can have significant repercussions for affected organizations.
Recommendation
- Upgrade the Import and export users and customers plugin to the latest version to patch CVE-2026-7641.
- Apply the Sigma rule
WordPress Multisite Privilege Escalation via Profile Updateto detect exploitation attempts against/wp-admin/profile.php. - Review the
acui_columnsoption in the WordPress database to identify any instances where multisite-prefixed capability column headers have been imported, and remove those fields. - Monitor WordPress user profile updates for unusual modifications to user capabilities using the
WordPress User Role Change Detectionrule.
Detection coverage 2
WordPress Multisite Privilege Escalation via Profile Update
criticalDetects attempts to exploit CVE-2026-7641 by monitoring POST requests to `/wp-admin/profile.php` with modifications to multisite capability meta keys.
WordPress User Role Change Detection
highDetects suspicious changes to user roles by monitoring WordPress logs for specific keywords.
Detection queries are kept inside the platform. Get full rules →