Description
The Change WP URL plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing or incorrect nonce validation on the 'change-wp-url' page. This makes it possible for unauthenticated attackers to change the WP Login URL via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2026-01-28
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery leading to unauthorized change of the WordPress login URL
Action: Apply Patch
AI Analysis

Impact

The vulnerability in the Change WP URL plugin arises because the "change-wp-url" settings page fails to validate nonce tokens. This flaw allows an unauthenticated attacker to craft a forged request that, if an administrator clicks, will alter the site’s login URL. The result is an uncontrolled change to the core authentication endpoint, which could enable credential harvesting, impersonation attacks, or lock administrators out if the new URL is unknown or incorrect. The weakness is documented as CWE‑352.

Affected Systems

All WordPress sites that have installed the Change WP URL plugin by chrisnowak in versions 1.0 or earlier are vulnerable. No other product or vendor is affected according to the CNA data.

Risk and Exploitability

The CVSS score is 4.3, placing the flaw in the low severity range. The EPSS score of less than 1 % indicates a very low likelihood of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires that an attacker gain the ability to send a crafted link to an administrator, typically through phishing or social engineering. Because the flaw is limited to a plugin setting page and does not involve direct code execution, the overall risk remains modest but still warrants remediation to prevent accidental administrative lock‑outs or credential compromise.

Generated by OpenCVE AI on April 15, 2026 at 17:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Replace or upgrade the Change WP URL plugin with a release that includes proper nonce validation; if no newer version exists, uninstall the plugin entirely.
  • Enable WordPress’s built-in nonce checks on all state‑changing requests or install a security plugin that adds CSRF protection to the admin area.
  • Educate site administrators to recognize and avoid clicking on suspicious links that prompt them to change site settings, and consider restricting the number of users with the capability to modify core URLs.

Generated by OpenCVE AI on April 15, 2026 at 17:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 29 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 28 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 28 Jan 2026 11:30:00 +0000

Type Values Removed Values Added
Description The Change WP URL plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing or incorrect nonce validation on the 'change-wp-url' page. This makes it possible for unauthenticated attackers to change the WP Login URL via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Change WP URL <= 1.0 - Cross-Site Request Forgery to Settings Update
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:33:25.381Z

Reserved: 2026-01-23T21:32:03.372Z

Link: CVE-2026-1398

cve-icon Vulnrichment

Updated: 2026-01-28T15:50:32.409Z

cve-icon NVD

Status : Deferred

Published: 2026-01-28T12:15:53.180

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1398

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T18:00:15Z

Weaknesses