The User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registration plugin for WordPress is vulnerable to Deserialization of Untrusted Data in versions up to, and including, 4.3.1 This is due to insufficient input validation and type checking on the wpuf_files parameter during form submission, combined with unconditional deserialization via maybe_unserialize() when displaying post content. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary PHP objects, which can be leveraged to execute arbitrary code, delete arbitrary files, or perform other malicious actions if a POP chain is present on the target system.
Project Subscriptions
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 08 May 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wedevs
Wedevs user Frontend: Ai Powered Frontend Posting, User Directory, Profile, Membership & User Registration Wordpress Wordpress wordpress |
|
| Vendors & Products |
Wedevs
Wedevs user Frontend: Ai Powered Frontend Posting, User Directory, Profile, Membership & User Registration Wordpress Wordpress wordpress |
Fri, 08 May 2026 09:00:00 +0000
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-05-08T08:26:32.725Z
Reserved: 2026-03-30T09:06:07.574Z
Link: CVE-2026-5127
No data.
Status : Received
Published: 2026-05-08T09:16:08.803
Modified: 2026-05-08T09:16:08.803
Link: CVE-2026-5127
No data.
OpenCVE Enrichment
Updated: 2026-05-08T10:30:06Z
Weaknesses