Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13737: CWE-352 Cross-Site Request Forgery (CSRF) in nextendweb Nextend Social Login and Register

0
Medium
VulnerabilityCVE-2025-13737cvecve-2025-13737cwe-352
Published: Fri Nov 28 2025 (11/28/2025, 03:27:06 UTC)
Source: CVE Database V5
Vendor/Project: nextendweb
Product: Nextend Social Login and Register

Description

CVE-2025-13737 is a medium severity Cross-Site Request Forgery (CSRF) vulnerability affecting the Nextend Social Login and Register WordPress plugin up to version 3. 1. 21. The flaw arises from missing or incorrect nonce validation in the 'unlinkUser' function, allowing unauthenticated attackers to trick site administrators into unlinking their social login accounts via forged requests. Exploitation requires user interaction, specifically the administrator clicking a malicious link. While this vulnerability does not impact confidentiality or availability, it can affect the integrity of user account linkages. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites should prioritize patching or applying mitigations to prevent potential misuse. Countries with high WordPress adoption and significant use of this plugin, such as Germany, the UK, and France, are most likely to be affected. Mitigations include updating the plugin once a patch is available, implementing additional CSRF protections, and educating administrators about phishing risks.

AI-Powered Analysis

AILast updated: 12/05/2025, 04:33:55 UTC

Technical Analysis

CVE-2025-13737 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Nextend Social Login and Register plugin for WordPress, affecting all versions up to and including 3.1.21. The vulnerability stems from missing or incorrect nonce validation in the 'unlinkUser' function, which is responsible for unlinking a user's social login account. Nonces are security tokens used to verify that a request originates from a legitimate source; their absence or misimplementation allows attackers to craft malicious requests that, if executed by an authenticated administrator, can unlink social login accounts without their consent. This attack vector requires no prior authentication by the attacker but does require user interaction, typically tricking an administrator into clicking a specially crafted link. The impact is limited to the integrity of user account linkages, as confidentiality and availability are not directly affected. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the ease of exploitation (network vector, low complexity, no privileges required) but the need for user interaction and limited impact scope. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The plugin is widely used in WordPress environments to facilitate social login and registration, making this vulnerability relevant to many websites relying on this functionality.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized unlinking of social login accounts by attackers who successfully trick site administrators into executing malicious requests. This could disrupt user access workflows, cause administrative overhead, and potentially degrade user trust if social login functionality is unexpectedly broken. While it does not expose sensitive data or cause denial of service, the integrity of user account management is compromised. Organizations relying heavily on social login for user authentication or registration may experience operational disruptions. Additionally, if attackers combine this vulnerability with other weaknesses, it could facilitate more complex attacks. Given the widespread use of WordPress and the popularity of social login plugins, the impact is non-negligible, especially for sectors with high reliance on web-based user authentication such as e-commerce, education, and public services in Europe.

Mitigation Recommendations

1. Monitor the Nextend Social Login and Register plugin for official security patches addressing CVE-2025-13737 and apply updates immediately upon release. 2. Until a patch is available, implement Web Application Firewall (WAF) rules to detect and block suspicious CSRF attempts targeting the 'unlinkUser' function. 3. Enforce strict administrator access controls and limit the number of users with unlinking privileges to reduce risk exposure. 4. Educate administrators about phishing and social engineering tactics to prevent them from clicking on malicious links. 5. Consider disabling the unlinking feature temporarily if it is not critical to operations. 6. Implement additional CSRF protections at the application or server level, such as verifying the HTTP Referer header or using custom tokens beyond the plugin's nonce mechanism. 7. Regularly audit WordPress plugins and their configurations to ensure security best practices are followed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-26T07:00:24.096Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692919d1a7cba954100dd851

Added to database: 11/28/2025, 3:41:05 AM

Last enriched: 12/5/2025, 4:33:55 AM

Last updated: 1/18/2026, 8:29:09 PM

Views: 134

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats