Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0745: CWE-918 Server-Side Request Forgery (SSRF) in webilop User Language Switch

0
High
VulnerabilityCVE-2026-0745cvecve-2026-0745cwe-918
Published: Sat Feb 14 2026 (02/14/2026, 06:42:27 UTC)
Source: CVE Database V5
Vendor/Project: webilop
Product: User Language Switch

Description

The User Language Switch plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.6.10 due to missing URL validation on the 'download_language()' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/21/2026, 22:18:25 UTC

Technical Analysis

CVE-2026-0745 is a Server-Side Request Forgery (SSRF) vulnerability identified in the webilop User Language Switch plugin for WordPress, affecting all versions up to and including 1.6.10. The vulnerability stems from inadequate input validation in the 'download_language()' function, which fails to properly validate URLs before making HTTP requests. As a result, an authenticated attacker with Administrator-level access or higher can manipulate the plugin to send arbitrary HTTP requests from the web server to internal or external systems. SSRF vulnerabilities allow attackers to bypass network restrictions, potentially accessing sensitive internal services, metadata endpoints, or other protected resources. Although exploitation requires administrative privileges, the impact is significant because it can lead to unauthorized information disclosure or modification within internal networks. The vulnerability has a CVSS 3.1 base score of 7.2 (high severity), reflecting its potential impact on confidentiality and integrity, ease of exploitation given administrative access, and the scope of affected systems. No public exploits have been reported yet, and no official patches or mitigation links are currently provided. The vulnerability was reserved in early January 2026 and published in mid-February 2026 by Wordfence. The CWE classification is CWE-918, which corresponds to SSRF vulnerabilities.

Potential Impact

The primary impact of this SSRF vulnerability is unauthorized access to internal network resources and services that are normally inaccessible from outside the web server. Attackers with administrative access can leverage this flaw to query internal APIs, cloud metadata services, or other sensitive endpoints, potentially extracting confidential data or modifying internal configurations. This can lead to data breaches, lateral movement within the network, or disruption of internal services. Since the vulnerability requires administrator-level authentication, the risk is elevated in environments where privilege escalation or insider threats exist. Organizations relying on the User Language Switch plugin expose themselves to risks of internal network reconnaissance and data exfiltration. The integrity of internal systems can also be compromised if attackers use SSRF to interact with internal management interfaces. Although availability impact is low, the confidentiality and integrity impacts are significant, especially in complex enterprise environments with segmented internal networks.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately restrict administrative access to trusted personnel and monitor for suspicious administrator activities. Since no official patch is currently available, consider disabling or uninstalling the User Language Switch plugin until a fixed version is released. Implement network-level controls such as egress filtering and internal firewall rules to prevent the web server from making unauthorized outbound requests to sensitive internal services. Employ web application firewalls (WAFs) with custom rules to detect and block SSRF attack patterns targeting the plugin's endpoints. Conduct thorough audits of administrator accounts and privilege assignments to reduce the risk of compromised credentials. Additionally, implement strict input validation and URL whitelisting for any plugin or custom code that performs outbound HTTP requests. Once a patch is released, apply it promptly and verify that URL validation is enforced correctly in the 'download_language()' function.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-08T18:43:02.867Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69901aecc9e1ff5ad8689375

Added to database: 2/14/2026, 6:49:16 AM

Last enriched: 2/21/2026, 10:18:25 PM

Last updated: 3/30/2026, 11:28:39 PM

Views: 158

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses