CVE-2023-3713
ProfileGrid <= 5.5.1 - Authenticated (Subscriber+) Arbitrary Option Update
CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th
The ProfileGrid plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'profile_magic_check_smtp_connection' function in versions up to, and including, 5.5.1. This makes it possible for authenticated attackers, with subscriber-level permissions or above to update the site options arbitrarily. This can be used by attackers to achieve privilege escalation.
| CWE | CWE-862 |
| Vendor | metagauss |
| Product | profilegrid – user profiles, groups and communities |
| Published | Jul 18, 2023 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for metagauss profilegrid – user profiles, groups and communities
Be the first to know when new high vulnerabilities affecting metagauss profilegrid – user profiles, groups and communities are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
metagauss / ProfileGrid – User Profiles, Groups and Communities
0 ≤ 5.5.1
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/473ba791-af99-4aae-99cb-ccf220e443e7?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/profilegrid-user-profiles-groups-and-communities/tags/5.4.8/admin/class-profile-magic-admin.php#L599 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/2938904/profilegrid-user-profiles-groups-and-communities#file0
Credits
István Márton