Plugin Vulnerability Hub
Plugin 8 known issues Latest disclosed Sep 16, 2025

Falang multilanguage for WordPress Vulnerabilities

Review known vulnerability records for the WordPress plugin Falang multilanguage for WordPress (`falang`), including severity, CVE references, affected versions, and patch status.

Recent tracked CVEs on this page include CVE-2025-58619, CVE-2025-48285 and CVE-2024-6869, so operators can jump from disclosure to patch validation without scanning the full feed first.

Known Records
8
High or Critical
2
Patch Coverage
100%
Last Updated
Sep 22, 2025
Priority CVE Quick Links

Fast paths into Falang multilanguage for WordPress CVE reports

Start with the highest-signal CVE records for this WordPress plugin before scanning the full vulnerability feed.

Indexed CVEs
7
Coverage Snapshot

What this page helps you verify fast

This hub clusters every indexed record for Falang multilanguage for WordPress so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.

Patch Visibility
8 records include a published patch path, leaving 0 with no listed safe release yet.
Severity Mix
0 critical and 2 high severity findings.
Recent CVEs
CVE-2025-58619, CVE-2025-48285 and CVE-2024-6869
Reference Workflow
Jump from the hub into the full report when you need remediation notes, exploit context, CVSS vectors, or source references.
Triage First

Open the records most likely to drive action

These recent records surface the CVE strings, patch cues, and direct report links most operators need first.

Known Vulnerabilities

Reports for Falang multilanguage for WordPress

Sorted by latest disclosure date so newly published issues surface first.

Plugin High Patched: Yes CVE-2025-58619
CVE-2025-58619: Falang multilanguage <= 1.3.65 - Unauthenticated PHP Object Injection

The Falang multilanguage for WordPress plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.3.65 via deserialization of untrusted input. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain i...

Published
Sep 16, 2025
Patched Release
1.3.66
Affected Versions
Versions up to 1.3.65
Next Step
Update to 1.3.66 or newer if supported.
Plugin Medium Patched: Yes CVE-2025-48285
CVE-2025-48285: Falang multilanguage <= 1.3.61 - Cross-Site Request Forgery

The Falang multilanguage for WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.61. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to perfor...

Published
May 19, 2025
Patched Release
1.3.62
Affected Versions
Versions up to 1.3.61
Next Step
Update to 1.3.62 or newer if supported.
Plugin Medium Patched: Yes CVE-2024-6869
CVE-2024-6869: Falang multilanguage for WordPress <= 1.3.52 - Missing Authorization to Translation Update and Information Exposure

The Falang multilanguage for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several functions in all versions up to, and including, 1.3.52. This makes it possible for authenticated attackers, with Subscriber-...

Published
Aug 07, 2024
Patched Release
1.3.53
Affected Versions
Versions up to 1.3.52
Next Step
Update to 1.3.53 or newer if supported.
Plugin Medium Patched: Yes CVE-2024-37240
CVE-2024-37240: Falang multilanguage <= 1.3.51 - Cross-Site Request Forgery

The Falang multilanguage plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.3.51. This is due to missing or incorrect nonce validation on the handle_strings_actions() function. This makes it possible for unauthenticated attackers...

Published
Jun 21, 2024
Patched Release
1.3.52
Affected Versions
Versions up to 1.3.51
Next Step
Update to 1.3.52 or newer if supported.
Plugin Medium Patched: Yes CVE-2024-4417
CVE-2024-4417: Falang multilanguage for WordPress <= 1.3.49 - Authenticated (Administrator+) Stored Cross-Site Scripting

The Falang multilanguage for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.3.49 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers,...

Published
May 10, 2024
Patched Release
1.3.50
Affected Versions
Versions up to 1.3.49
Next Step
Update to 1.3.50 or newer if supported.
Plugin High Patched: Yes CVE-2024-30495
CVE-2024-30495: Falang multilanguage <= 1.3.47 - Authenticated (Administrator+) SQL Injection

The Falang multilanguage plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 1.3.47 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated...

Published
Mar 28, 2024
Patched Release
1.3.48
Affected Versions
Versions up to 1.3.47
Next Step
Update to 1.3.48 or newer if supported.
Plugin Medium Patched: Yes CVE-2023-37968
CVE-2023-37968: Falang multilanguage <= 1.3.39 - Cross-Site Request Forgery via add_language

The Falang multilanguage plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.3.39. This is due to missing or incorrect nonce validation on the add_language, update_language, and delete_language functions. This makes it possible for...

Published
Jul 12, 2023
Patched Release
1.3.40
Affected Versions
Versions up to 1.3.39
Next Step
Update to 1.3.40 or newer if supported.
Plugin Medium Patched: Yes
Falang multilanguage for WordPress < 1.3.18 - Reflected Cross-Site Scripting

The Falang multilanguage plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in versions before 1.3.18 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary we...

Published
Oct 25, 2021
Patched Release
1.3.18
Affected Versions
Versions before 1.3.18
Next Step
Update to 1.3.18 or newer if supported.