CVE-2025-14976: CWE-352 Cross-Site Request Forgery (CSRF) in wpeverest User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin
The User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.4.8. This is due to missing or incorrect nonce validation on the 'process_row_actions' function with the 'delete' action. This makes it possible for unauthenticated attackers to delete arbitrary post via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-14976 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WordPress plugin 'User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin' by wpeverest, affecting all versions up to and including 4.4.8. The vulnerability stems from improper or missing nonce validation in the 'process_row_actions' function when handling the 'delete' action. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and prevent CSRF attacks. Because this validation is absent or incorrect, an attacker can craft a malicious request that, if an authenticated administrator clicks on it (e.g., via a link in an email or on a website), causes the deletion of arbitrary posts on the WordPress site. This attack does not require the attacker to be authenticated but does require user interaction from a privileged user, making it a targeted but feasible attack vector. The vulnerability impacts the integrity and availability of site content by enabling unauthorized deletion of posts. The CVSS 3.1 base score is 5.4 (medium severity), with vector metrics indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and low availability impact (A:L). No public exploits are currently known, but the vulnerability is published and should be addressed promptly. The plugin is widely used for managing user registrations, memberships, and content restrictions, making the vulnerability relevant for sites relying on these functionalities.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized deletion of critical content or membership data on WordPress sites using the affected plugin. This can disrupt business operations, damage reputation, and cause data loss, particularly for organizations relying on membership management or content restriction features. The attack requires an administrator to be tricked into clicking a malicious link, so organizations with less stringent user awareness or those with many administrators are at higher risk. The impact on confidentiality is minimal, but integrity and availability of site content can be compromised. This could affect e-commerce sites, membership-based services, educational platforms, and any organization using this plugin for user management. Recovery may require restoring deleted content from backups, which could incur downtime and operational costs. Additionally, successful exploitation could be leveraged as a foothold for further attacks if combined with other vulnerabilities or misconfigurations.
Mitigation Recommendations
1. Monitor for and apply official patches or updates from wpeverest as soon as they are released to fix the nonce validation issue. 2. In the absence of an official patch, implement custom nonce validation checks in the 'process_row_actions' function to ensure requests are legitimate. 3. Limit the number of administrators and enforce the principle of least privilege to reduce the attack surface. 4. Educate administrators and privileged users about the risks of clicking on unsolicited or suspicious links, especially those that could trigger administrative actions. 5. Employ web application firewalls (WAFs) with rules to detect and block suspicious CSRF attempts targeting the plugin’s endpoints. 6. Regularly back up WordPress site content and databases to enable quick recovery from unauthorized deletions. 7. Consider implementing multi-factor authentication (MFA) for administrator accounts to reduce the risk of session hijacking or unauthorized access. 8. Audit plugin usage and consider alternatives if timely patching is not feasible or if the plugin is no longer maintained.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-14976: CWE-352 Cross-Site Request Forgery (CSRF) in wpeverest User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin
Description
The User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.4.8. This is due to missing or incorrect nonce validation on the 'process_row_actions' function with the 'delete' action. This makes it possible for unauthenticated attackers to delete arbitrary post via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2025-14976 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WordPress plugin 'User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin' by wpeverest, affecting all versions up to and including 4.4.8. The vulnerability stems from improper or missing nonce validation in the 'process_row_actions' function when handling the 'delete' action. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and prevent CSRF attacks. Because this validation is absent or incorrect, an attacker can craft a malicious request that, if an authenticated administrator clicks on it (e.g., via a link in an email or on a website), causes the deletion of arbitrary posts on the WordPress site. This attack does not require the attacker to be authenticated but does require user interaction from a privileged user, making it a targeted but feasible attack vector. The vulnerability impacts the integrity and availability of site content by enabling unauthorized deletion of posts. The CVSS 3.1 base score is 5.4 (medium severity), with vector metrics indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and low availability impact (A:L). No public exploits are currently known, but the vulnerability is published and should be addressed promptly. The plugin is widely used for managing user registrations, memberships, and content restrictions, making the vulnerability relevant for sites relying on these functionalities.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized deletion of critical content or membership data on WordPress sites using the affected plugin. This can disrupt business operations, damage reputation, and cause data loss, particularly for organizations relying on membership management or content restriction features. The attack requires an administrator to be tricked into clicking a malicious link, so organizations with less stringent user awareness or those with many administrators are at higher risk. The impact on confidentiality is minimal, but integrity and availability of site content can be compromised. This could affect e-commerce sites, membership-based services, educational platforms, and any organization using this plugin for user management. Recovery may require restoring deleted content from backups, which could incur downtime and operational costs. Additionally, successful exploitation could be leveraged as a foothold for further attacks if combined with other vulnerabilities or misconfigurations.
Mitigation Recommendations
1. Monitor for and apply official patches or updates from wpeverest as soon as they are released to fix the nonce validation issue. 2. In the absence of an official patch, implement custom nonce validation checks in the 'process_row_actions' function to ensure requests are legitimate. 3. Limit the number of administrators and enforce the principle of least privilege to reduce the attack surface. 4. Educate administrators and privileged users about the risks of clicking on unsolicited or suspicious links, especially those that could trigger administrative actions. 5. Employ web application firewalls (WAFs) with rules to detect and block suspicious CSRF attempts targeting the plugin’s endpoints. 6. Regularly back up WordPress site content and databases to enable quick recovery from unauthorized deletions. 7. Consider implementing multi-factor authentication (MFA) for administrator accounts to reduce the risk of session hijacking or unauthorized access. 8. Audit plugin usage and consider alternatives if timely patching is not feasible or if the plugin is no longer maintained.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-19T15:49:21.390Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69621061c540fa4b547cca6c
Added to database: 1/10/2026, 8:40:01 AM
Last enriched: 1/10/2026, 8:54:15 AM
Last updated: 1/10/2026, 11:53:36 PM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.