Gain access to the phpMyAdmin app, usually accessed through your hosting account. Navigate to your WP database and its users table (often named wp_users, but the “wp_” part might be different). Ideally you’d see your user_login name or user_email address in this table. Also, if possible, determine if there are any users that should not be there.
If your user is truly missing and/or there are users that should not be there, it’s a clear sign that your site has been hacked and there has been unauthorized access. If this is the case, there’s no need to panic, this can be resolved if you proceed carefully. Work through the recommendations listed in this FAQ.
If your user is missing, through the phpMyAdmin app, it’s possible to take over another administrator’s login or to re-add your user. Taking over is somewhat easier in phpMyAdmin than re-adding. You can then add yourself back from the other user’s account the usual way in WP admin. If you’re not sure which user is administrator, search the usermeta table for meta_key “wp_capabilities” where meta_value is %LIKE% “administrator”. Note the user_id value for any record found. Find that user ID in the users table and reset their password according to these instructions (skip to step 7). Log in as that user using the new password.
Once you gain admin access, you can add yourself back in the usual way. Then tell the user whose account you took over that they’ll need to reset their password using the usual link from the login screen. Assuming of course that this user is a legitimate admin user. If not legitimate, you can remove that user once you’re logged in as yourself. But they’ll likely be back unless the vulnerability is patched.