Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13737: CWE-352 Cross-Site Request Forgery (CSRF) in nextendweb Nextend Social Login and Register

0
Medium
VulnerabilityCVE-2025-13737cvecve-2025-13737cwe-352
Published: Fri Nov 28 2025 (11/28/2025, 03:27:06 UTC)
Source: CVE Database V5
Vendor/Project: nextendweb
Product: Nextend Social Login and Register

Description

The Nextend Social Login and Register plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.21. This is due to missing or incorrect nonce validation on the 'unlinkUser' function. This makes it possible for unauthenticated attackers to unlink the user's social login via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 10:15:21 UTC

Technical Analysis

CVE-2025-13737 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Nextend Social Login and Register plugin for WordPress, present in all versions up to and including 3.1.21. The vulnerability stems from the absence or improper implementation of nonce validation in the 'unlinkUser' function, which is responsible for unlinking a user's social login account from their WordPress profile. Nonces are security tokens used to verify that a request originates from a legitimate source, preventing unauthorized actions. Without proper nonce validation, an attacker can craft a malicious request that, when executed by a logged-in administrator (e.g., by clicking a link), causes the unlinking of a social login account without the administrator's explicit consent. This attack vector requires no authentication by the attacker but does require user interaction from an administrator, making exploitation feasible in targeted phishing or social engineering scenarios. The vulnerability affects the integrity of user account linkage, potentially disrupting user authentication flows or causing administrative confusion. The CVSS 3.1 score of 4.3 reflects a medium severity level, considering the network attack vector, low attack complexity, no privileges required, but requiring user interaction and limited impact confined to integrity. No public exploits have been reported, but the widespread use of WordPress and this plugin increases the potential attack surface. The vulnerability highlights the importance of proper nonce implementation in WordPress plugins to defend against CSRF attacks.

Potential Impact

The primary impact of this vulnerability is on the integrity of user account linkage within WordPress sites using the Nextend Social Login and Register plugin. An attacker can cause an administrator to unlink social login accounts, potentially disrupting user authentication and causing administrative overhead to restore correct configurations. While this does not directly compromise user credentials or site availability, it can degrade user experience and trust, especially on sites relying heavily on social login functionality. In environments where social login is critical for user access or where administrative workflows depend on linked accounts, this could lead to operational disruptions. Additionally, attackers might leverage this unlinking to facilitate further attacks or social engineering by confusing users or administrators. Since exploitation requires administrator interaction, the risk is mitigated somewhat but remains significant for targeted attacks. Organizations worldwide using this plugin are at risk, particularly those with high administrative activity and reliance on social login features.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update the Nextend Social Login and Register plugin to a version that includes proper nonce validation on the 'unlinkUser' function once available. Until a patch is released, administrators should implement the following specific measures: 1) Restrict administrative access and ensure administrators are trained to recognize and avoid clicking suspicious links, especially from untrusted sources. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block CSRF attack patterns targeting the unlinkUser endpoint. 3) Use security plugins that enforce nonce validation or add custom nonce checks to the unlinkUser function via plugin hooks or custom code. 4) Monitor administrative actions and logs for unusual unlinking events to detect potential exploitation attempts. 5) Limit the number of administrators and enforce strong authentication to reduce the risk of compromised admin accounts. 6) Conduct regular security audits of WordPress plugins and configurations to identify and remediate similar vulnerabilities proactively. These targeted actions go beyond generic advice by focusing on nonce validation enforcement, administrative user behavior, and monitoring specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-26T07:00:24.096Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692919d1a7cba954100dd851

Added to database: 11/28/2025, 3:41:05 AM

Last enriched: 2/27/2026, 10:15:21 AM

Last updated: 3/24/2026, 2:44:11 PM

Views: 195

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses