<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-4609 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-4609/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 15:52:17 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-4609/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-4609: ProfileGrid WordPress Plugin Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-4609-profilegrid-auth-bypass/</link><pubDate>Wed, 13 May 2026 15:52:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-4609-profilegrid-auth-bypass/</guid><description>The ProfileGrid WordPress plugin versions up to 5.9.8.4 contain an authentication bypass vulnerability (CVE-2026-4609) that allows authenticated users with subscriber-level privileges to add themselves or others to arbitrary groups, including paid groups, without proper authorization, leading to privilege escalation and potential financial impact.</description><content:encoded><![CDATA[<p>CVE-2026-4609 affects the ProfileGrid – User Profiles, Groups and Communities plugin for WordPress. The vulnerability stems from a missing capability check on the <code>pm_invite_user</code> function in versions up to and including 5.9.8.4. This oversight enables authenticated attackers, possessing subscriber-level access or higher, to bypass authorization mechanisms and payment gateways. Attackers can exploit this vulnerability to add themselves or any registered user to any ProfileGrid group, including those that are closed or require payment for access. This issue was reported on May 13, 2026, and poses a significant risk to websites using the vulnerable plugin, as it can lead to unauthorized access to premium content and features.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker registers an account on the WordPress site, obtaining subscriber-level access.</li>
<li>The attacker identifies the vulnerable <code>pm_invite_user</code> function within the ProfileGrid plugin.</li>
<li>The attacker crafts a malicious HTTP request to the WordPress site, targeting the <code>pm_invite_user</code> function, with parameters specifying the target group and user to add.</li>
<li>The crafted request bypasses the intended capability checks due to the missing authorization validation.</li>
<li>The <code>pm_invite_user</code> function processes the request, adding the attacker or the specified user to the targeted group, regardless of group access restrictions.</li>
<li>If the targeted group is a paid group, the attacker gains access to premium content and features without completing the required payment process.</li>
<li>The attacker leverages the unauthorized group membership to access restricted areas of the website and potentially perform actions reserved for higher-privileged users.</li>
<li>The attacker may further escalate privileges or exfiltrate sensitive data accessible through the unauthorized group membership.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4609 allows subscriber-level attackers to bypass authorization and payment gates, potentially affecting all ProfileGrid groups, including closed and paid ones. This can lead to unauthorized access to premium content and features. The number of victims depends on the number of websites using the vulnerable ProfileGrid plugin version. The impacted sectors are broad, as WordPress is used by various organizations. The financial impact includes loss of revenue from bypassed payment gates and potential data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the ProfileGrid – User Profiles, Groups and Communities plugin for WordPress to the latest version, which includes a fix for CVE-2026-4609.</li>
<li>Deploy the Sigma rule &ldquo;Detect ProfileGrid Unauthorized Group Invitation&rdquo; to detect exploitation attempts targeting the vulnerable <code>pm_invite_user</code> function.</li>
<li>Review WordPress user roles and permissions to ensure appropriate access controls are in place.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication bypass</category><category>wordpress plugin</category><category>privilege escalation</category><category>cve-2026-4609</category></item></channel></rss>