Description
The Nextend Social Login and Register plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.21. This is due to missing or incorrect nonce validation on the 'unlinkUser' function. This makes it possible for unauthenticated attackers to unlink the user's social login via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-11-28
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass – Unlinking social account
Action: Update Plugin
AI Analysis

Impact

The Nextend Social Login and Register plugin for WordPress is vulnerable to Cross‑Site Request Forgery (CWE‑352) because the unlinkUser function does not properly validate the nonce. This flaw allows an attacker, without prior authentication, to force an administrator into unlinking a user’s social login by tricking them into clicking a malicious link or loading a crafted page. As a result, the targeted account can lose its social authentication method, potentially locking the user out or exposing the account to credential takeover. The vulnerability does not allow code execution or direct data exfiltration, but it undermines account integrity and may facilitate targeted denial of service on user access.

Affected Systems

The vulnerability affects the plugin Nextend Social Login and Register developed by Nextendweb. All plugin releases up to and including version 3.1.21 are impacted. No other vendor or product is listed.

Risk and Exploitability

The CVSS score of 4.3 indicates medium severity. The EPSS score of less than 1% reflects a very low probability of exploitation at the time of analysis, and the issue is not yet listed in CISA’s Known Exploited Vulnerabilities catalog. Exploitation requires no special privileges; the attacker only needs to craft and deliver a forged request that an administrator will unknowingly submit, typically via a malicious link or embedded resource. Because the flaw is a CSRF weakness, the likelihood of successful exploitation depends primarily on user education and the presence of additional CSRF defenses.

Generated by OpenCVE AI on April 21, 2026 at 17:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Nextend Social Login and Register to the latest patched version (≥3.1.22).
  • If an immediate upgrade is not feasible, add proper nonce validation to the unlinkUser endpoint so that the request is tied to the user’s session and cannot be forged.
  • Enforce role‑based access control by restricting unlinking functionality to administrators only and monitor for unusual unlink requests.

Generated by OpenCVE AI on April 21, 2026 at 17:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 28 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 28 Nov 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Nextendweb
Nextendweb nextend Social Login
Wordpress
Wordpress wordpress
Vendors & Products Nextendweb
Nextendweb nextend Social Login
Wordpress
Wordpress wordpress

Fri, 28 Nov 2025 03:45:00 +0000

Type Values Removed Values Added
Description The Nextend Social Login and Register plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.21. This is due to missing or incorrect nonce validation on the 'unlinkUser' function. This makes it possible for unauthenticated attackers to unlink the user's social login via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Nextend Social Login and Register <= 3.1.21 - Cross-Site Request Forgery to Unlink User Social Login
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Nextendweb Nextend Social Login
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:11:26.663Z

Reserved: 2025-11-26T07:00:24.096Z

Link: CVE-2025-13737

cve-icon Vulnrichment

Updated: 2025-11-28T14:57:33.344Z

cve-icon NVD

Status : Deferred

Published: 2025-11-28T04:16:00.010

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13737

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T18:00:11Z

Weaknesses