The recent discovery of CVE-2026-5617 has raised alarms within the server security domain. This vulnerability affects the Login as User plugin in all versions up to 1.0.3. It introduces a significant risk for hosting providers and system administrators alike, due to its potential for authenticated privilege escalation.
CVE-2026-5617 allows authenticated users with Subscriber-level access to escalate privileges to Administrator by manipulating a client-controlled cookie, specifically the oclaup_original_admin. This flaw occurs as the handle_return_to_admin() function does not verify if the cookie was legitimately set and grants users greater access improperly.
For system administrators and hosting providers, this vulnerability presents a critical threat. If exploited, attackers can gain full control over affected WordPress sites, leading to potential data breaches or service disruptions. Therefore, it is essential to implement immediate steps to mitigate the risk.
To safeguard your servers from this exploit, consider the following actions:
oclaup_original_admin cookie from users' browsers.Additionally, employing a web application firewall (WAF) can help fortify your security posture and provide active malware detection to combat brute-force attacks on your infrastructure.
In today's digital landscape, server security is paramount. Don't wait for vulnerabilities to turn into full-blown threats. Take action now by exploring BitNinja's proactive server protection solution. Sign up for a free 7-day trial to experience enhanced security features tailored for system administrators and hosting providers.




