Impact
The User Language Switch plugin for WordPress contains a server‑side request forgery flaw that allows a user with Administrator privileges to supply any URL to an internal function. The missing validation enables the application to fetch data from arbitrary locations, including internal services, and may read or modify those services. This flaw reflects the input validation weakness identified by CWE‑918.
Affected Systems
WordPress sites that use the User Language Switch plugin distributed by webilop and run version 1.6.10 or earlier are affected. Versions newer than 1.6.10 are not listed as vulnerable.
Risk and Exploitability
The overall severity, measured by the CVSS score of 5.5, is moderate. The low estimation of exploitation likelihood (under 1%) combined with the absence of a public exploitation record suggests that successful attacks are unlikely without direct access. Attackers still need Administrator rights and the target must be reachable from the web server, so internal administrators with excessive privileges become a key risk factor.
OpenCVE Enrichment