CVE-2026-0745

User Language Switch · User Language Switch

The User Language Switch plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to and including version 1.

Executive summary

The User Language Switch plugin for WordPress contains a Server-Side Request Forgery vulnerability that could allow attackers to pivot through the server to access internal resources.

Vulnerability

This vulnerability is a Server-Side Request Forgery (SSRF) flaw. It allows an attacker to induce the server-side application to make HTTP requests to an arbitrary domain, potentially allowing an unauthenticated attacker to interact with internal network services that are not otherwise exposed to the internet.

Business impact

An SSRF vulnerability can be used to bypass network firewalls and gain access to sensitive internal data, such as cloud metadata services (e.g., AWS IAM credentials) or internal databases. The CVSS score of 7.2 indicates a High severity risk, as it provides a gateway for attackers to conduct internal reconnaissance and lateral movement within the corporate network.

Remediation

Immediate Action: Update the User Language Switch plugin to the latest version or remove the plugin if it is no longer required for business operations.

Proactive Monitoring: Monitor outbound network traffic from the WordPress web server for unusual requests to internal IP addresses or cloud metadata endpoints.

Compensating Controls: Implement egress filtering at the network level to restrict the web server's ability to communicate with internal resources or sensitive cloud service IPs.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the potential for internal network exposure and cloud credential theft, this vulnerability must be addressed urgently. Organizations should apply the latest security updates for the User Language Switch plugin immediately. If a patch is unavailable, consider disabling the plugin to mitigate the risk of internal infrastructure compromise.