The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-3477

CVE-2026-3477: WordPress PZ Frontend Manager Auth Bypass

CVE-2026-3477 is an authorization bypass vulnerability in the PZ Frontend Manager plugin for WordPress, allowing authenticated attackers to delete arbitrary users. This article covers technical details, affected versions, and mitigation.

Published: April 10, 2026

CVE-2026-3477 Overview

The PZ Frontend Manager plugin for WordPress contains a Missing Authorization vulnerability (CWE-862) in all versions up to and including 1.0.6. The pzfm_user_request_action_callback() function, registered via the wp_ajax_pzfm_user_request_action action hook, lacks both capability checks and nonce verification. This function handles user activation, deactivation, and deletion operations. When the dataType parameter is set to delete, the function calls wp_delete_user() on all provided user IDs without verifying that the current user has the appropriate permissions.

Notably, the similar pzfm_remove_item_callback() function does check pzfm_can_delete_user() before performing deletions, indicating this was an oversight in the vulnerable function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary WordPress users (including administrators) by sending a crafted request to the AJAX endpoint.

Critical Impact

Authenticated attackers with minimal privileges (Subscriber-level) can delete any WordPress user account, including administrator accounts, potentially causing complete site takeover or denial of service.

Affected Products

  • PZ Frontend Manager plugin for WordPress version 1.0.6 and earlier

Discovery Timeline

  • 2026-04-08 - CVE CVE-2026-3477 published to NVD
  • 2026-04-08 - Last updated in NVD database

Technical Details for CVE-2026-3477

Vulnerability Analysis

This vulnerability represents a classic Missing Authorization flaw where security controls were inconsistently applied across similar functions. The pzfm_user_request_action_callback() function processes AJAX requests for user management operations but fails to implement the same authorization checks present in the analogous pzfm_remove_item_callback() function.

The vulnerable function is exposed through WordPress's AJAX handler system, making it accessible to any authenticated user. Without capability checks, the function does not verify whether the requesting user has administrative privileges required to delete users. Without nonce verification, the function also lacks CSRF protection, though the primary concern here is the missing authorization check.

The function processes a dataType parameter that determines the operation type, and when set to delete, it passes user IDs directly to WordPress's wp_delete_user() function. This allows any authenticated user to delete arbitrary accounts, including administrator accounts, by crafting appropriate AJAX requests.

Root Cause

The root cause is an oversight in the plugin's authorization implementation. While the developers correctly implemented capability checks in the pzfm_remove_item_callback() function using pzfm_can_delete_user(), they failed to apply the same protection to the pzfm_user_request_action_callback() function. This inconsistency allowed a code path that performs the same sensitive operation (user deletion) to bypass security controls entirely.

Attack Vector

The attack is network-based and requires minimal privileges. An attacker needs only a valid WordPress account with Subscriber-level access. The attack flow involves:

  1. Authenticating to WordPress with any valid user account (including the lowest-privilege Subscriber role)
  2. Identifying target user IDs to delete (administrators can often be identified through author pages or enumeration)
  3. Sending a crafted AJAX POST request to /wp-admin/admin-ajax.php with:
    • Action parameter: pzfm_user_request_action
    • dataType parameter: delete
    • User ID(s) to delete
  4. The server processes the request without authorization checks and deletes the specified users

The vulnerability mechanism involves the pzfm_user_request_action_callback() function directly calling wp_delete_user() without first verifying that the requesting user has the delete_users capability. For full technical details, see the WordPress Plugin Code Reference and the Wordfence Vulnerability Report.

Detection Methods for CVE-2026-3477

Indicators of Compromise

  • Unexpected user account deletions, particularly administrator accounts, with no corresponding administrative activity
  • AJAX requests to wp-admin/admin-ajax.php with action pzfm_user_request_action from non-administrator users
  • Sudden loss of user accounts followed by inability to access WordPress administrative functions
  • Web server logs showing POST requests to the AJAX endpoint with dataType=delete parameters

Detection Strategies

  • Monitor WordPress activity logs for user deletion events, especially when not correlated with administrator login sessions
  • Implement web application firewall (WAF) rules to alert on suspicious AJAX requests containing user deletion parameters
  • Review access logs for patterns of requests to the pzfm_user_request_action endpoint from non-administrator IP addresses or sessions
  • Deploy file integrity monitoring on user database tables to detect unexpected modifications

Monitoring Recommendations

  • Enable WordPress audit logging plugins to capture all user management operations with full context
  • Configure alerts for any user deletion events that occur outside of normal administrative workflows
  • Monitor for new user registrations followed immediately by deletion requests (potential attack pattern)
  • Implement rate limiting on AJAX endpoints to slow down potential mass-deletion attacks

How to Mitigate CVE-2026-3477

Immediate Actions Required

  • Update the PZ Frontend Manager plugin to a patched version when available
  • If no patch is available, immediately deactivate and remove the PZ Frontend Manager plugin
  • Audit WordPress user accounts for any unexpected deletions or modifications
  • Review web server access logs for potential exploitation attempts against the vulnerable endpoint
  • Restore any deleted user accounts from backup if exploitation has occurred

Patch Information

No vendor patch has been confirmed at this time. Check the WordPress plugin repository for updated versions of PZ Frontend Manager that address this vulnerability. Monitor the Wordfence Vulnerability Report for patch availability updates.

Workarounds

  • Deactivate the PZ Frontend Manager plugin until a patched version is available
  • Implement a web application firewall rule to block requests to the vulnerable AJAX action endpoint
  • Restrict user registration if possible to limit the pool of potential attackers
  • Consider implementing custom code to add capability checks to the vulnerable function (advanced users only)
bash
# Workaround: Block access to vulnerable AJAX action via .htaccess
# Add to WordPress .htaccess file
<IfModule mod_rewrite.c>
    RewriteEngine On
    RewriteCond %{QUERY_STRING} action=pzfm_user_request_action [NC,OR]
    RewriteCond %{REQUEST_BODY} action=pzfm_user_request_action [NC]
    RewriteRule .* - [F,L]
</IfModule>

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechWordpress

  • SeverityMEDIUM

  • CVSS Score5.3

  • EPSS Probability0.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-862
  • Technical References
  • WordPress Plugin Code Reference

  • WordPress Plugin Code Reference

  • WordPress Plugin Code Reference

  • WordPress Plugin Code Reference

  • WordPress Plugin Code Reference

  • WordPress Plugin Code Reference

  • Wordfence Vulnerability Report
  • Related CVEs
  • CVE-2026-2519: Bookly WordPress Plugin Auth Bypass Flaw

  • CVE-2026-4326: Vertex Addons Auth Bypass Vulnerability

  • CVE-2025-14944: Backup Migration Plugin Auth Bypass Flaw

  • CVE-2026-3646: WordPress LTL Plugin Auth Bypass Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English