Skip to main content

CVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)

Medium
VulnerabilityCVE-2025-7686cvecve-2025-7686cwe-352
Published: Sat Aug 16 2025 (08/16/2025, 03:38:53 UTC)
Source: CVE Database V5
Vendor/Project: lmyoaoa
Product: weichuncai(WP伪春菜)

Description

The weichuncai(WP伪春菜) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5. This is due to missing or incorrect nonce validation on the sm-options.php page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 08/24/2025, 01:07:59 UTC

Technical Analysis

CVE-2025-7686 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the weichuncai (WP伪春菜) WordPress plugin, versions up to and including 1.5. The root cause is the absence or improper implementation of nonce validation on the sm-options.php page, which is responsible for handling plugin settings. This flaw allows an unauthenticated attacker to craft a malicious request that, if executed by an authenticated site administrator (e.g., by clicking a link or visiting a malicious webpage), can update plugin settings and inject malicious web scripts. The vulnerability leverages the trust relationship between the administrator's browser and the WordPress site, enabling unauthorized changes without direct authentication or elevated privileges. The CVSS v3.1 score of 6.1 reflects a medium severity, with an attack vector of network (remote), low attack complexity, no privileges required, but requiring user interaction (UI:R). The impact includes limited confidentiality and integrity loss, as attackers can alter plugin configurations and inject scripts, potentially leading to further compromise or persistent malicious code execution within the WordPress environment. No known exploits are currently reported in the wild, and no patches have been published at the time of this report. This vulnerability is classified under CWE-352, a common web application security weakness related to CSRF attacks.

Potential Impact

For European organizations using the weichuncai WordPress plugin, this vulnerability poses a risk primarily to the integrity and confidentiality of their web applications. Successful exploitation could allow attackers to modify plugin settings and inject malicious scripts, potentially leading to unauthorized data exposure, session hijacking, or further compromise of the website and its users. This can damage organizational reputation, lead to regulatory non-compliance (especially under GDPR if personal data is exposed), and disrupt business operations relying on the affected WordPress sites. Given that the attack requires tricking an administrator into interaction, social engineering risks are elevated. Organizations with public-facing WordPress sites that use this plugin are particularly vulnerable, as attackers can target administrators through phishing or malicious links. The lack of available patches increases the urgency for mitigation. While the vulnerability does not directly impact availability, the integrity and confidentiality risks can have significant operational and legal consequences for European entities.

Mitigation Recommendations

1. Immediately audit WordPress sites to identify installations of the weichuncai (WP伪春菜) plugin, especially versions up to 1.5. 2. Until an official patch is released, restrict administrative access to trusted networks or VPNs to reduce exposure to CSRF attacks. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious POST requests targeting sm-options.php or related plugin endpoints. 4. Educate site administrators on the risks of clicking untrusted links or visiting unknown websites while logged into WordPress admin panels to reduce the risk of social engineering. 5. Employ browser security features such as SameSite cookies to mitigate CSRF risks where possible. 6. Monitor logs for unusual changes to plugin settings or unexpected administrative actions. 7. Once available, promptly apply official patches or updates from the plugin vendor. 8. Consider temporarily disabling or removing the plugin if it is not critical to operations until a secure version is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-15T18:54:22.324Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689fff64ad5a09ad007439b9

Added to database: 8/16/2025, 3:47:48 AM

Last enriched: 8/24/2025, 1:07:59 AM

Last updated: 9/28/2025, 1:38:18 AM

Views: 42

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats