Cyber Posture

CVE-2026-5617

High

Published: 15 April 2026

Published
15 April 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0005 14.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-5617 is a high-severity Authorization Bypass Through User-Controlled Key (CWE-639) vulnerability in Wordpress (inferred from references). Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 14.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-3 mandates enforcement of approved authorizations for access, directly preventing privilege escalation by requiring server-side verification instead of trusting the client-controlled oclaup_original_admin cookie.

prevent

SI-10 requires validation of information inputs like the oclaup_original_admin cookie, addressing the lack of server-side checks that allowed attackers to forge admin user IDs.

prevent

AC-6 enforces least privilege, limiting the impact of escalation attempts by ensuring privilege switches in plugins like Login as User grant only necessary access.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The vulnerability is a privilege escalation flaw allowing authenticated low-privileged users to gain administrator access by abusing an improperly validated client-controlled cookie in the user switch functionality.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The Login as User plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.3. This is due to the handle_return_to_admin() function trusting a client-controlled cookie (oclaup_original_admin) to determine which user to authenticate as, without…

more

any server-side verification that the cookie value was legitimately set during an admin-initiated user switch. This makes it possible for authenticated attackers, with Subscriber-level access and above, to escalate their privileges to administrator by setting the oclaup_original_admin cookie to an administrator's user ID and triggering the "Return to Admin" functionality.

Deeper analysisAI

CVE-2026-5617 is a privilege escalation vulnerability (CWE-639) in the Login as User plugin for WordPress, affecting all versions up to and including 1.0.3. The flaw exists in the handle_return_to_admin() function, which trusts a client-controlled cookie named oclaup_original_admin to determine which user to authenticate as, without any server-side verification that the cookie value was legitimately set during an admin-initiated user switch. Published on 2026-04-15, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

Authenticated attackers with Subscriber-level access or higher can exploit this vulnerability by setting the oclaup_original_admin cookie to an administrator's user ID and then triggering the "Return to Admin" functionality, allowing them to escalate their privileges to administrator level.

Advisories and references, including Wordfence threat intelligence and the plugin's WordPress.org page, detail the issue, with source code excerpts from version 1.0.3 and the trunk available in the WordPress plugin trac repository pointing to lines 45 and 50 in class-login-handler.php. Security practitioners should consult these resources for update guidance, as versions beyond 1.0.3 may address the flaw.

Details

CWE(s)

Affected Products

Wordpress
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-0020Shared CWE-639
CVE-2026-34602Shared CWE-639
CVE-2026-2697Shared CWE-639
CVE-2025-13768Shared CWE-639
CVE-2026-29002Shared CWE-639
CVE-2026-25147Shared CWE-639
CVE-2026-33030Shared CWE-639
CVE-2025-67165Shared CWE-639
CVE-2026-32103Shared CWE-639
CVE-2026-25497Shared CWE-639

References