Highland Software Custom Role Manager <= 1.0.0 - Authenticated (Subscriber+) Privilege Escalation
Summary
| CVE | CVE-2026-7106 |
|---|---|
| State | PUBLISHED |
| Assigner | Wordfence |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-27 03:16:00 UTC |
| Updated | 2026-04-27 03:16:00 UTC |
| Description | The Highland Software Custom Role Manager plugin for WordPress is vulnerable to Privilege Escalation in versions up to and including 1.0.0. This is due to insufficient authorization checks in the hscrm_save_user_roles() function, which is hooked to the personal_options_update action accessible by any authenticated user. This makes it possible for authenticated attackers, with Subscriber-level access or higher, to potentially modify user roles via the profile update form. |
Risk And Classification
Primary CVSS: v3.1 8.8 HIGH from [email protected]
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Problem Types: CWE-269 | CWE-269 CWE-269 Improper Privilege Management
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 8.8 | HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | CNA | DECLARED | 8.8 | HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Jgrodgers | Highland Software Custom Role Manager | affected 1.0.0 semver | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| www.wordfence.com/threat-intel/vulnerabilities/id/80a258a6-634c-4d7d-981f-bcbc0... | [email protected] | www.wordfence.com | |
| plugins.trac.wordpress.org/browser/highland-software-custom-role-manager/tags/1.0.0/incl... | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/browser/highland-software-custom-role-manager/trunk/includes/... | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/browser/highland-software-custom-role-manager/tags/1.0.0/incl... | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/browser/highland-software-custom-role-manager/trunk/includes/... | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/browser/highland-software-custom-role-manager/trunk/includes/... | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/browser/highland-software-custom-role-manager/tags/1.0.1/incl... | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/browser/highland-software-custom-role-manager/tags/1.0.0/incl... | [email protected] | plugins.trac.wordpress.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: Herc Bandiola (en)
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| CNA | 2026-04-26T14:20:30.000Z | Disclosed |
There are currently no legacy QID mappings associated with this CVE.