First published: Fri Feb 28 2025(Updated: )
The Wp Social Login and Register Social Counter plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.0. This is due to missing or incorrect nonce validation on the counter_access_key_setup() function. This makes it possible for unauthenticated attackers to update social login provider settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Wp Social Login and Register Social Counter | <=3.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1506 has a high severity rating due to its potential for Cross-Site Request Forgery attacks.
To fix CVE-2025-1506, update the Wp Social Login and Register Social Counter plugin to version 3.1.1 or later.
CVE-2025-1506 affects all versions of the Wp Social Login and Register Social Counter plugin up to and including 3.1.0.
CVE-2025-1506 could allow unauthorized actions to be performed on behalf of users without their consent.
In the context of CVE-2025-1506, Cross-Site Request Forgery allows attackers to trick users into executing unwanted actions on a web application in which they are authenticated.