Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0745: CWE-918 Server-Side Request Forgery (SSRF) in webilop User Language Switch

0
High
VulnerabilityCVE-2026-0745cvecve-2026-0745cwe-918
Published: Sat Feb 14 2026 (02/14/2026, 06:42:27 UTC)
Source: CVE Database V5
Vendor/Project: webilop
Product: User Language Switch

Description

The User Language Switch plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.6.10 due to missing URL validation on the 'download_language()' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

AI-Powered Analysis

AILast updated: 02/14/2026, 07:04:21 UTC

Technical Analysis

CVE-2026-0745 is a Server-Side Request Forgery (SSRF) vulnerability identified in the User Language Switch plugin for WordPress, developed by webilop. The vulnerability exists in all versions up to and including 1.6.10 due to insufficient validation of URLs in the 'download_language()' function. This function is responsible for downloading language files but does not properly sanitize or restrict the URLs it processes. As a result, an attacker with authenticated Administrator-level access can craft requests that cause the server to initiate HTTP requests to arbitrary internal or external locations. SSRF vulnerabilities are particularly dangerous because they can be used to bypass network access controls, query internal services that are not exposed externally, and potentially manipulate internal APIs or services. Although exploitation requires administrative privileges, which limits the attacker scope, the impact is significant because it can lead to information disclosure and integrity violations within the internal network. The CVSS v3.1 score of 7.2 reflects a high severity, with network attack vector, low attack complexity, no privileges required (PR:N in vector likely indicates no additional privileges beyond authentication), no user interaction, and a scope change. No public exploits or patches are currently available, increasing the urgency for organizations to implement mitigations. The vulnerability is classified under CWE-918, which covers SSRF issues. Given the widespread use of WordPress in Europe and the critical nature of administrative access exploitation, this vulnerability poses a substantial risk to affected web environments.

Potential Impact

For European organizations, the impact of CVE-2026-0745 can be considerable, especially for those relying on WordPress sites with the User Language Switch plugin installed. An attacker with administrator credentials could leverage this SSRF flaw to access internal services that are otherwise inaccessible from the internet, such as internal APIs, databases, or cloud metadata services. This could lead to unauthorized data disclosure, including sensitive customer or corporate information, or manipulation of internal systems. Additionally, the SSRF could be a stepping stone for lateral movement within the network or for launching further attacks such as privilege escalation or data exfiltration. The vulnerability does not directly impact availability but compromises confidentiality and integrity. European organizations in sectors with strict data protection regulations (e.g., GDPR) face compliance risks if internal data is exposed. The lack of a patch and known exploits means organizations must act proactively to mitigate risk. The threat is particularly relevant for public-facing WordPress sites managed by enterprises, government agencies, and critical infrastructure providers in Europe.

Mitigation Recommendations

To mitigate CVE-2026-0745 effectively, European organizations should: 1) Immediately audit WordPress installations to identify the presence of the User Language Switch plugin and confirm the version in use. 2) Restrict administrative access to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 3) Implement network-level controls to restrict outbound HTTP requests from web servers, limiting the ability of SSRF attacks to reach internal services. 4) Use web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the 'download_language()' function or unusual URL parameters. 5) Monitor logs for anomalous internal requests originating from the web server that could indicate SSRF exploitation attempts. 6) If possible, temporarily disable or remove the User Language Switch plugin until a security patch is released. 7) Engage with the plugin vendor or community to track patch availability and apply updates promptly once released. 8) Conduct internal penetration testing focusing on SSRF vectors to identify and remediate similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-08T18:43:02.867Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69901aecc9e1ff5ad8689375

Added to database: 2/14/2026, 6:49:16 AM

Last enriched: 2/14/2026, 7:04:21 AM

Last updated: 2/15/2026, 6:02:04 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats