The Groundhogg plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.7.9.8. This is due to missing nonce validation in the 'ajax_edit_contact' function. This makes it possible for authenticated attackers to receive the auto login link via shortcode and then modify the assigned user to the auto login link to elevate verified user privileges via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
History

Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Title Groundhogg <= 2.7.9.8 - Cross-Site Request Forgery to Privilege Escalation

Mon, 13 Jan 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2023-05-20T02:03:23.875Z

Updated: 2026-04-08T17:11:21.204Z

Reserved: 2023-05-16T13:17:27.854Z

Link: CVE-2023-2736

cve-icon Vulnrichment

Updated: 2024-08-02T06:33:05.227Z

cve-icon NVD

Status : Modified

Published: 2023-05-20T03:15:09.397

Modified: 2026-04-08T18:18:05.617

Link: CVE-2023-2736

cve-icon Redhat

No data.