Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14976: CWE-352 Cross-Site Request Forgery (CSRF) in wpeverest User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin

0
Medium
VulnerabilityCVE-2025-14976cvecve-2025-14976cwe-352
Published: Sat Jan 10 2026 (01/10/2026, 08:22:57 UTC)
Source: CVE Database V5
Vendor/Project: wpeverest
Product: User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin

Description

The User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.4.8. This is due to missing or incorrect nonce validation on the 'process_row_actions' function with the 'delete' action. This makes it possible for unauthenticated attackers to delete arbitrary post via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 01/18/2026, 07:45:34 UTC

Technical Analysis

CVE-2025-14976 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WordPress plugin 'User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin' affecting all versions up to and including 4.4.8. The root cause is the absence or improper implementation of nonce validation in the 'process_row_actions' function, specifically when processing the 'delete' action. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not from malicious third parties. Without proper nonce checks, an attacker can craft a malicious URL or form that, when visited or submitted by an authenticated administrator, triggers the deletion of arbitrary posts on the site. This attack requires no authentication from the attacker but does require that the victim (an admin user) interacts with the malicious request, such as clicking a link. The vulnerability impacts the integrity and availability of site content by enabling unauthorized deletion of posts. The CVSS v3.1 score of 5.4 reflects a medium severity, with attack vector being network, low attack complexity, no privileges required, user interaction required, and impacts limited to integrity and availability. No known public exploits have been reported, and no official patches are linked yet, indicating that the vulnerability may be newly disclosed or under active investigation. The plugin is widely used for managing user registrations, memberships, and content restrictions, making it a valuable target for attackers aiming to disrupt site operations or remove content maliciously.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity and availability of WordPress-based websites that utilize this plugin. Successful exploitation can lead to unauthorized deletion of posts, which may result in data loss, disruption of services, and reputational damage. Organizations relying on these sites for customer engagement, membership management, or content delivery could face operational interruptions. Since the attack requires tricking an administrator into clicking a malicious link, phishing campaigns targeting administrative staff could be an effective attack vector. The impact is heightened for organizations with high administrative activity and less stringent security awareness. Additionally, loss of critical content or membership data could have compliance implications under regulations such as GDPR if personal data is involved. While no known exploits are currently active, the medium severity rating and ease of exploitation via social engineering make this a credible threat that should be addressed promptly.

Mitigation Recommendations

1. Immediately verify if the affected plugin version (up to 4.4.8) is in use and plan for an upgrade once an official patch is released. 2. Until a patch is available, restrict administrative access to trusted networks or use VPNs to reduce exposure. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the 'process_row_actions' endpoint or unusual delete actions. 4. Educate administrators and privileged users about the risks of phishing and social engineering, emphasizing caution when clicking on unsolicited links. 5. Employ multi-factor authentication (MFA) for administrative accounts to reduce the risk of compromised credentials. 6. Regularly back up WordPress content and database to enable quick restoration in case of content deletion. 7. Monitor logs for unusual delete actions or access patterns that could indicate exploitation attempts. 8. Consider deploying security plugins that add additional nonce validation or CSRF protections as a temporary safeguard. 9. Engage with the plugin vendor or community to track patch releases and security advisories.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-19T15:49:21.390Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69621061c540fa4b547cca6c

Added to database: 1/10/2026, 8:40:01 AM

Last enriched: 1/18/2026, 7:45:34 AM

Last updated: 2/7/2026, 2:16:09 AM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats