<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Highland Software — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/highland-software/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/highland-software/feed.xml" rel="self" type="application/rss+xml"/><item><title>WordPress Custom Role Manager Plugin Privilege Escalation via CVE-2026-7106</title><link>https://feed.craftedsignal.io/briefs/2024-01-wordpress-privesc/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wordpress-privesc/</guid><description>Highland Software's Custom Role Manager plugin for WordPress, versions 1.0.0 and earlier, contains a privilege escalation vulnerability (CVE-2026-7106) that allows authenticated users with subscriber-level access to modify user roles due to insufficient authorization checks in the hscrm_save_user_roles() function.</description><content:encoded><![CDATA[<p>The Highland Software Custom Role Manager plugin, versions up to and including 1.0.0, is vulnerable to privilege escalation. The vulnerability, identified as CVE-2026-7106, stems from a lack of sufficient authorization checks within the <code>hscrm_save_user_roles()</code> function. This function is accessible to any authenticated user via the <code>personal_options_update</code> action. This allows an attacker with minimal privileges (subscriber level or higher) to potentially elevate their own privileges or those of other users by manipulating user roles through the profile update form. Successful exploitation grants attackers the ability to perform actions reserved for higher-level administrators, potentially leading to complete site compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker obtains valid credentials for a WordPress user account with at least subscriber-level privileges.</li>
<li>The attacker authenticates to the WordPress site using their credentials.</li>
<li>The attacker accesses their user profile page, typically located at <code>/wp-admin/profile.php</code>.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>personal_options_update</code> action, modifying the <code>wp_capabilities</code> user meta field. The request is designed to bypass the insufficient authorization checks in the <code>hscrm_save_user_roles()</code> function.</li>
<li>The crafted request is submitted through the profile update form. This likely involves intercepting and modifying the POST request sent when the user clicks the &ldquo;Update Profile&rdquo; button.</li>
<li>The <code>hscrm_save_user_roles()</code> function is triggered, and due to the missing authorization checks, the attacker&rsquo;s modified user roles are saved to the database.</li>
<li>The attacker&rsquo;s account now possesses elevated privileges, such as administrator or editor roles, depending on the attacker&rsquo;s goal and the payload in the malicious request.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7106 allows attackers with minimal privileges to gain administrative control over the WordPress site. This can lead to a variety of malicious activities, including defacement, malware injection, data theft, and denial of service. Given the widespread use of WordPress, this vulnerability poses a significant risk to websites using the affected plugin. A successful attack can result in complete compromise of the affected website.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Highland Software Custom Role Manager plugin to a patched version that addresses CVE-2026-7106.</li>
<li>Monitor WordPress access logs for suspicious POST requests to <code>/wp-admin/profile.php</code> targeting the <code>personal_options_update</code> action to detect exploitation attempts.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious WordPress Role Updates</code> to identify attempts to modify user roles from subscriber-level accounts.</li>
<li>Review user roles and permissions regularly to identify and remediate any unauthorized privilege escalations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>wordpress</category><category>cve</category></item></channel></rss>