INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global phishing Multiple sectors HIGH 27m Global insider Cybersecurity Services CRITICAL 36m Global ransomware Multiple sectors (U.S. companies) CRITICAL 50m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 27m Global insider Cybersecurity Services CRITICAL 36m Global ransomware Multiple sectors (U.S. companies) CRITICAL 50m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 27m Global insider Cybersecurity Services CRITICAL 36m Global ransomware Multiple sectors (U.S. companies) CRITICAL 50m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h
Vulnerabilities

CVE-2025-11877

High
User Activity Log Plugin Authentication Bypass Allows Unauthorized Site Options Modification
CWE-862 — Weakness Type
Published: Jan 7, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
7.5
🔗 NVD Official
📄 Description (English)

The User Activity Log plugin is vulnerable to a limited options update in versions up to, and including, 2.2. The failed-login handler 'ual_shook_wp_login_failed' lacks a capability check and writes failed usernames directly into update_option() calls. This makes it possible for unauthenticated attackers to push select site options from 0 to a non-zero value, allowing them to reopen registration or corrupt options like 'wp_user_roles', breaking wp-admin access.

🤖 AI Executive Summary

The User Activity Log WordPress plugin versions up to 2.2 contains a critical authentication bypass vulnerability (CWE-862) that allows unauthenticated attackers to modify critical site options through failed login attempts. Attackers can manipulate options like user registration settings and wp_user_roles, potentially breaking administrative access and compromising site security without any authentication.

📄 Description (Arabic)

تتيح هذه الثغرة الأمنية للمهاجمين غير المصرح لهم استغلال معالج تسجيل محاولات الدخول الفاشلة 'ual_shook_wp_login_failed' الذي يفتقر إلى فحص الصلاحيات المناسبة. يقوم المعالج بكتابة أسماء المستخدمين الفاشلة مباشرة في استدعاءات update_option() مما يسمح بتغيير قيم إعدادات الموقع الحساسة من صفر إلى قيم أخرى. يمكن استغلال هذه الثغرة لإعادة فتح تسجيل المستخدمين الجدد أو إفساد إعدادات أدوار المستخدمين 'wp_user_roles'، مما يؤدي إلى تعطيل الوصول إلى لوحة التحكم الإدارية وتعريض النظام بأكمله للاختراق. تصنف هذه الثغرة ضمن CWE-862 المتعلقة بغياب التحقق من الصلاحيات.

🤖 ملخص تنفيذي (AI)

تحتوي إضافة User Activity Log لووردبريس حتى الإصدار 2.2 على ثغرة حرجة في تجاوز المصادقة تسمح للمهاجمين غير المصادق عليهم بتعديل إعدادات الموقع الحرجة من خلال محاولات تسجيل الدخول الفاشلة. يمكن للمهاجمين التلاعب بإعدادات مثل تسجيل المستخدمين وأدوار المستخدمين، مما قد يؤدي إلى تعطيل الوصول الإداري وتعريض أمن الموقع للخطر دون أي مصادقة.

🤖 AI Intelligence Analysis Analyzed: Feb 28, 2026 07:40
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations using WordPress with this plugin face severe risks including unauthorized administrative access disruption, potential data breaches through forced user registration reopening, and complete site compromise. This is particularly critical for government portals, e-commerce platforms, and financial institutions that must maintain strict access controls under SAMA and NCA regulations.
🏢 Affected Saudi Sectors
القطاع الحكومي القطاع المالي والمصرفي التجارة الإلكترونية الإعلام والنشر الرقمي التعليم الرعاية الصحية
⚖️ Saudi Risk Score (AI)
8.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately disable or remove the User Activity Log plugin (versions up to 2.2) from all WordPress installations until a patched version is released by the vendor.
2. Conduct a comprehensive audit of all WordPress site options, particularly 'users_can_register' and 'wp_user_roles', to identify and revert any unauthorized modifications made through this vulnerability.
3. Implement Web Application Firewall (WAF) rules to monitor and block suspicious failed login patterns, review authentication logs for exploitation attempts, and consider implementing additional authentication plugins with proper capability checks.
🔧 خطوات المعالجة (العربية)
1. تعطيل أو إزالة إضافة User Activity Log (الإصدارات حتى 2.2) فوراً من جميع تثبيتات ووردبريس حتى صدور نسخة محدثة ومعالجة من المطور.
2. إجراء مراجعة شاملة لجميع إعدادات موقع ووردبريس، وخاصة 'users_can_register' و 'wp_user_roles'، لتحديد وإلغاء أي تعديلات غير مصرح بها تمت من خلال هذه الثغرة.
3. تطبيق قواعد جدار حماية تطبيقات الويب (WAF) لمراقبة وحظر أنماط محاولات تسجيل الدخول الفاشلة المشبوهة، ومراجعة سجلات المصادقة للكشف عن محاولات الاستغلال، والنظر في تطبيق إضافات مصادقة إضافية مع فحوصات صلاحيات مناسبة.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
5-1-1 5-2-1 4-1-1 4-2-1
🔵 SAMA CSF
CCC-1.1.1 CCC-1.1.2 CCC-5.1.1 CCC-6.1.1
🟡 ISO 27001:2022
A.9.2.1 A.9.4.1 A.12.6.1 A.18.2.3
📊 CVSS Score
7.5
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredN — None / Network
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityN — None / Network
IntegrityH — High
AvailabilityN — None / Network
📋 Quick Facts
Severity High
CVSS Score7.5
CWECWE-862
EPSS0.03%
Exploit No
Patch ✓ Yes
Published 2026-01-07
Source Feed nvd
Views 1
🇸🇦 Saudi Risk Score
8.0
/ 10.0 — Saudi Risk
Priority: HIGH
🏷️ Tags
CWE-862
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.