Skip to content
CVSS 9.8 · CRITICAL

CVE-2026-5722

The MoreConvert Pro plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.9.14. This is due to the guest waitlist verification flow not invalidating or regenerating verification tokens when the customer email address is changed. This makes it possible for unauthenticated attackers to authenticate as existing users, including administrators, by obtaining a valid guest verification token for an attacker-controlled email, changing the same guest customer email to the target account email through the public waitlist flow, and then using the original verification link.

Ver en NVD

Análisis

The MoreConvert Pro plugin for WordPress contains a critical authentication bypass vulnerability that allows unauthenticated attackers to gain administrator access. While the impact is severe, this is a niche third-party plugin rather than a core infrastructure component or widely used development library, making it unlikely to affect a large portion of the community.

Severidad

Puntaje: 9.8(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Tipo de falla (CWE): CWE-287

EPSS

Probabilidad de explotación (próx. 30 días): 0.0020 (0.2%)
Percentil: 41.6%
EPSS: 2026-05-06

Descripción técnica

The MoreConvert Pro plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.9.14. This is due to the guest waitlist verification flow not invalidating or regenerating verification tokens when the customer email address is changed. This makes it possible for unauthenticated attackers to authenticate as existing users, including administrators, by obtaining a valid guest verification token for an attacker-controlled email, changing the same guest customer email to the target account email through the public waitlist flow, and then using the original verification link.

Publicada: 5/5/2026, 2:16:05
Última modificación: 5/5/2026, 19:09:32

Referencias

InicioEventosBlogRecursosEquipo