<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Import and Export Users and Customers Plugin — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/import-and-export-users-and-customers-plugin/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 May 2026 05:16:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/import-and-export-users-and-customers-plugin/feed.xml" rel="self" type="application/rss+xml"/><item><title>WordPress Import and Export Users Plugin Privilege Escalation Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-privesc/</link><pubDate>Sat, 02 May 2026 05:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-privesc/</guid><description>A privilege escalation vulnerability exists in the Import and export users and customers plugin for WordPress (versions &lt;= 2.0.8) due to an incomplete blocklist allowing authenticated users to gain administrator privileges on subsites within a Multisite network.</description><content:encoded><![CDATA[<p>The Import and export users and customers plugin for WordPress, a plugin used to manage user data, is vulnerable to privilege escalation. This vulnerability, identified as CVE-2026-7641, affects all versions of the plugin up to and including 2.0.8. The vulnerability stems from an incomplete blocklist in the <code>save_extra_user_profile_fields()</code> function. This function fails to adequately filter meta keys for subsites within a WordPress Multisite network, allowing attackers to manipulate user roles. Successful exploitation allows authenticated attackers with Subscriber-level access or higher to escalate their privileges to Administrator on any subsite within the Multisite network. Exploitation requires the targeted WordPress instance to be part of a Multisite network and have specific settings enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An administrator imports a CSV file containing multisite-prefixed capability column headers (e.g., <code>wp_2_capabilities</code>) using the affected plugin.</li>
<li>The administrator enables the &ldquo;Show fields in profile?&rdquo; option within the plugin settings. This action stores the imported column headers (including the multisite capabilities) in the <code>acui_columns</code> option.</li>
<li>A low-privileged user (e.g., Subscriber) authenticates to the WordPress subsite.</li>
<li>The attacker navigates to their user profile page (<code>/wp-admin/profile.php</code>). The plugin displays the previously imported multisite capability fields as editable options on the profile page.</li>
<li>The attacker crafts a profile update request, setting the value of the <code>wp_{subsite_id}_capabilities</code> meta key to <code>a:1:{s:13:&quot;administrator&quot;;b:1;}</code> which grants administrator privileges.</li>
<li>The attacker submits the crafted profile update to <code>/wp-admin/profile.php</code>.</li>
<li>The <code>save_extra_user_profile_fields()</code> function processes the update. Due to the incomplete blocklist, the function fails to prevent the modification of the <code>wp_{subsite_id}_capabilities</code> meta key.</li>
<li>The <code>update_user_meta()</code> function writes the attacker-controlled value directly to the user&rsquo;s metadata, granting them Administrator privileges on the specified subsite.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7641 allows an attacker to gain complete control over a WordPress subsite within a Multisite network. This can lead to unauthorized access to sensitive data, modification of website content, installation of malicious plugins or themes, and potential compromise of the entire Multisite network. Given the widespread use of WordPress and the Import and export users and customers plugin, a successful attack can have significant repercussions for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Import and export users and customers plugin to the latest version to patch CVE-2026-7641.</li>
<li>Apply the Sigma rule <code>WordPress Multisite Privilege Escalation via Profile Update</code> to detect exploitation attempts against <code>/wp-admin/profile.php</code>.</li>
<li>Review the <code>acui_columns</code> option in the WordPress database to identify any instances where multisite-prefixed capability column headers have been imported, and remove those fields.</li>
<li>Monitor WordPress user profile updates for unusual modifications to user capabilities using the <code>WordPress User Role Change Detection</code> rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>wordpress</category><category>cloud</category></item></channel></rss>