Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14976: CWE-352 Cross-Site Request Forgery (CSRF) in wpeverest User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin

0
Medium
VulnerabilityCVE-2025-14976cvecve-2025-14976cwe-352
Published: Sat Jan 10 2026 (01/10/2026, 08:22:57 UTC)
Source: CVE Database V5
Vendor/Project: wpeverest
Product: User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin

Description

The User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.4.8. This is due to missing or incorrect nonce validation on the 'process_row_actions' function with the 'delete' action. This makes it possible for unauthenticated attackers to delete arbitrary post via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 01/10/2026, 08:54:15 UTC

Technical Analysis

CVE-2025-14976 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WordPress plugin 'User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin' by wpeverest, affecting all versions up to and including 4.4.8. The vulnerability stems from improper or missing nonce validation in the 'process_row_actions' function when handling the 'delete' action. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and prevent CSRF attacks. Because this validation is absent or incorrect, an attacker can craft a malicious request that, if an authenticated administrator clicks on it (e.g., via a link in an email or on a website), causes the deletion of arbitrary posts on the WordPress site. This attack does not require the attacker to be authenticated but does require user interaction from a privileged user, making it a targeted but feasible attack vector. The vulnerability impacts the integrity and availability of site content by enabling unauthorized deletion of posts. The CVSS 3.1 base score is 5.4 (medium severity), with vector metrics indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and low availability impact (A:L). No public exploits are currently known, but the vulnerability is published and should be addressed promptly. The plugin is widely used for managing user registrations, memberships, and content restrictions, making the vulnerability relevant for sites relying on these functionalities.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized deletion of critical content or membership data on WordPress sites using the affected plugin. This can disrupt business operations, damage reputation, and cause data loss, particularly for organizations relying on membership management or content restriction features. The attack requires an administrator to be tricked into clicking a malicious link, so organizations with less stringent user awareness or those with many administrators are at higher risk. The impact on confidentiality is minimal, but integrity and availability of site content can be compromised. This could affect e-commerce sites, membership-based services, educational platforms, and any organization using this plugin for user management. Recovery may require restoring deleted content from backups, which could incur downtime and operational costs. Additionally, successful exploitation could be leveraged as a foothold for further attacks if combined with other vulnerabilities or misconfigurations.

Mitigation Recommendations

1. Monitor for and apply official patches or updates from wpeverest as soon as they are released to fix the nonce validation issue. 2. In the absence of an official patch, implement custom nonce validation checks in the 'process_row_actions' function to ensure requests are legitimate. 3. Limit the number of administrators and enforce the principle of least privilege to reduce the attack surface. 4. Educate administrators and privileged users about the risks of clicking on unsolicited or suspicious links, especially those that could trigger administrative actions. 5. Employ web application firewalls (WAFs) with rules to detect and block suspicious CSRF attempts targeting the plugin’s endpoints. 6. Regularly back up WordPress site content and databases to enable quick recovery from unauthorized deletions. 7. Consider implementing multi-factor authentication (MFA) for administrator accounts to reduce the risk of session hijacking or unauthorized access. 8. Audit plugin usage and consider alternatives if timely patching is not feasible or if the plugin is no longer maintained.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-19T15:49:21.390Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69621061c540fa4b547cca6c

Added to database: 1/10/2026, 8:40:01 AM

Last enriched: 1/10/2026, 8:54:15 AM

Last updated: 1/10/2026, 11:53:36 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats