Skip to content
CVSS 9.8 · CRITICAL

CVE-2026-5722

The MoreConvert Pro plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.9.14. This is due to the guest waitlist verification flow not invalidating or regenerating verification tokens when the customer email address is changed. This makes it possible for unauthenticated attackers to authenticate as existing users, including administrators, by obtaining a valid guest verification token for an attacker-controlled email, changing the same guest customer email to the target account email through the public waitlist flow, and then using the original verification link.

View on NVD

Analysis

The MoreConvert Pro plugin for WordPress contains a critical authentication bypass vulnerability that allows unauthenticated attackers to gain administrator access. While the impact is severe, this is a niche third-party plugin rather than a core infrastructure component or widely used development library, making it unlikely to affect a large portion of the community.

Severity

Score: 9.8(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-287

EPSS

Probability of exploitation (next 30 days): 0.0020 (0.2%)
Percentile: 41.6%
EPSS: 2026-05-06

Technical description

The MoreConvert Pro plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.9.14. This is due to the guest waitlist verification flow not invalidating or regenerating verification tokens when the customer email address is changed. This makes it possible for unauthenticated attackers to authenticate as existing users, including administrators, by obtaining a valid guest verification token for an attacker-controlled email, changing the same guest customer email to the target account email through the public waitlist flow, and then using the original verification link.

Published: 5/5/2026, 2:16:05 AM
Last modified: 5/5/2026, 7:09:32 PM

References

HomeEventsBlogResourcesTeam