Skip to content

PySecTools/CVE-2026-3629

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2026-3629 - WordPress Privilege Escalation Checker

Python Version License Telegram GitHub

A command-line tool to detect CVE-2026-3629, a critical privilege escalation vulnerability in the "Import and export users and customers" WordPress plugin.


📢 Join Our Community

Stay updated with the latest security tools, vulnerabilities, and hacking techniques!

Telegram Channel

Why Join?

  • ✅ Latest CVE updates
  • ✅ New security tools
  • ✅ Hacking tutorials
  • ✅ Bug bounty tips
  • ✅ Community support

👉 Channel: @PySecTools


📋 About CVE-2026-3629

Attribute Value
CVE ID CVE-2026-3629
CVSS Score 8.1 (High)
Attack Vector Network
Privileges Required None
CWE CWE-269 (Improper Privilege Management)

Description: The plugin's save_extra_user_profile_fields function fails to restrict user meta keys. The wp_capabilities key is not blocked, allowing unauthenticated attackers to gain Administrator privileges.

Affected Versions: ≤ 1.29.7 (Fixed in 1.29.8+)

Exploitation Prerequisites (BOTH required):

  1. "Show fields in profile" setting enabled
  2. CSV with wp_capabilities column imported

Impact: Full admin access, site takeover, malicious plugin installation.

Discoverer: Supanat Konprom | Disclosed: March 21, 2026


🚀 Features

  • Single target scanning
  • Default values for username, email & timeout
  • False-positive detection
  • Colored output & error handling

📦 Installation

git clone https://github.com/PySecTools/CVE-2026-3629-Checker.git
cd CVE-2026-3629-Checker
pip install requests colorama

💻 How to Use

Basic Syntax

python3 cve_2026_3629_checker.py <URL> [OPTIONS]

Quick Examples

Command Description
python3 cve_2026_3629_checker.py http://example.com Run with default settings
python3 cve_2026_3629_checker.py http://example.com -u hacker -e hack@mail.com Custom username & email
python3 cve_2026_3629_checker.py http://example.com -t 15 Set timeout to 15 seconds
python3 cve_2026_3629_checker.py https://target.com -u admin -e a@a.com -t 20 Full options

Arguments

Argument Default Description
url Required Target WordPress URL
-u, --username test_username Test username
-e, --email test_username@example.com Test email
-t, --timeout 30 Timeout in seconds

📊 Sample Output

Vulnerable Site

╔══════════════════════════════════════════════════════╗
║     WordPress Privilege Escalation Checker           ║
║           Single Target Mode                         ║
╚══════════════════════════════════════════════════════╝

════════════════════════════════════════
 Target: http://vulnerable-site.com
════════════════════════════════════════

[✓] VULNERABLE! User 'test_username' created successfully!
[+] URL: http://vulnerable-site.com

════════════════════════════════════════
[✓] RESULT: VULNERABLE ✓
════════════════════════════════════════

Secure Site

[✗] SAFE (Registration is blocked/disabled)

════════════════════════════════════════
[✗] RESULT: NOT VULNERABLE ✗
════════════════════════════════════════

🛡️ Mitigation

  1. Update plugin to version 1.29.8 or higher
  2. Disable "Show fields in profile" setting
  3. Audit existing admin users for unauthorized accounts

⚠️ Legal Disclaimer

For educational and authorized testing only. Only use on systems you own or have written permission to test. Unauthorized use is illegal.


🤝 Support & Community

Donations (Support Development)

USDT (TRC20): TNia5W6TameZ81y6FaSU3RhefYPnFDBZou

USDT (BSC - BEP20): 0x494f424e34840b21597ad75fc092a8d200655257


📚 References

  1. Wordfence Threat Intelligence - CVE-2026-3629
  2. NVD National Vulnerability Database
  3. WordPress Plugin Trac - Columns.php (line 193, 217)
  4. WordPress Plugin Trac - Helper.php (line 146)
  5. Plugin Changelog - Version 1.29.8
  6. CVE Program - CVE-2026-3629 Entry
  7. CVSS Calculator - Vector String Analysis

📄 License

MIT License - See LICENSE file for details.


⭐ Star this repository if it helped you!

About

WordPress Privilege Escalation Checker

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages