Server-Side Request Forgery Vulnerability in User Language Switch Plugin for WordPress
CVE-2026-0745

5.5MEDIUM

Key Information:

Vendor

WordPress

Vendor
CVE Published:
14 February 2026

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2026-0745?

The User Language Switch plugin for WordPress allows authenticated users with Administrator-level access or higher to exploit a vulnerability in the 'download_language()' function. Due to insufficient URL validation, attackers can perform Server-Side Request Forgery, enabling them to initiate web requests to unintended external sites or internal services. This could lead to unauthorized data exposure, internal service manipulation, or other security breaches, emphasizing the importance of immediate patching or updating to mitigate risks.

Affected Version(s)

User Language Switch 0 <= 1.6.10

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Bhumividh Treloges
.