WordPress LJUsers Plugin Vulnerability

MEDIUM (6.4) No Patch (2 days)

Threat Intelligence

Low Risk
EPSS Score: 0.03% chance of exploitation (percentile: 7%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

The LJUsers plugin is a WordPress plugin used to manage user information. It's a relatively niche software, and if you don't recognize the name, you're probably not affected. The vulnerability allows authenticated attackers with Contributor-level access and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Am I affected?

You're affected if you use LJUsers. Specific version info not stated in the advisory.

Affected Products

WordPress.org / LJUsers Plugin

How to fix

To fix this vulnerability, upgrade to WordPress LJUsers plugin version 1.2.1 or later.

Immediate mitigations:

  • Restrict network access to your WordPress installation (firewall it from the public internet)
  • Audit admin account activity for suspicious access patterns
  • Monitor for unauthorized token creation