Skip to main content

CVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)

Medium
VulnerabilityCVE-2025-7686cvecve-2025-7686cwe-352
Published: Sat Aug 16 2025 (08/16/2025, 03:38:53 UTC)
Source: CVE Database V5
Vendor/Project: lmyoaoa
Product: weichuncai(WP伪春菜)

Description

The weichuncai(WP伪春菜) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5. This is due to missing or incorrect nonce validation on the sm-options.php page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 08/16/2025, 04:04:40 UTC

Technical Analysis

CVE-2025-7686 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the weichuncai (WP伪春菜) WordPress plugin, versions up to and including 1.5. The vulnerability arises due to missing or incorrect nonce validation on the sm-options.php page, which is responsible for handling plugin settings. Nonces in WordPress are security tokens used to verify that requests are intentional and originate from authenticated users. Without proper nonce validation, an attacker can craft a malicious request that, when executed by an authenticated site administrator (e.g., by clicking a link), can update plugin settings or inject malicious scripts. This attack does not require the attacker to be authenticated, but it does require user interaction from an administrator, making it a UI:R (User Interaction Required) vulnerability. The CVSS 3.1 base score is 6.1 (medium severity), reflecting the network attack vector, low attack complexity, no privileges required, user interaction required, and impacts on confidentiality and integrity but not availability. The scope is changed (S:C) because the vulnerability allows modification of settings that can affect other components or users. Although no known exploits are currently reported in the wild, the vulnerability could be leveraged to inject malicious web scripts, potentially leading to further compromise such as privilege escalation, data leakage, or persistent backdoors. The plugin is a niche WordPress extension, likely used in specific communities or regions, and the vulnerability specifically targets the plugin's administrative interface, making site administrators the primary targets for exploitation.

Potential Impact

For European organizations using the weichuncai plugin, this vulnerability poses a risk primarily to the confidentiality and integrity of their WordPress sites. Successful exploitation could allow attackers to alter plugin settings or inject malicious scripts, potentially leading to unauthorized data access, defacement, or the establishment of persistent malicious code within the site. This could damage organizational reputation, lead to data breaches involving personal or sensitive information, and disrupt business operations reliant on the affected websites. Since the attack requires tricking an administrator into clicking a malicious link, organizations with less stringent user security awareness or lacking multi-factor authentication on admin accounts are at higher risk. Additionally, if the injected scripts are used to pivot to other internal systems or to harvest credentials, the impact could extend beyond the website itself. Given the medium severity and the requirement for user interaction, the threat is moderate but should not be underestimated, especially for organizations with public-facing WordPress sites that handle sensitive data or provide critical services.

Mitigation Recommendations

1. Immediate mitigation involves updating the weichuncai plugin to a patched version once available. Since no patch links are currently provided, organizations should monitor vendor announcements closely. 2. Until a patch is released, restrict access to the WordPress admin interface by IP whitelisting or VPN access to reduce exposure. 3. Implement strict Content Security Policy (CSP) headers to limit the impact of any injected scripts. 4. Educate site administrators about the risk of clicking unknown or suspicious links, especially when logged into the WordPress admin panel. 5. Employ multi-factor authentication (MFA) for all administrator accounts to reduce the risk of session hijacking or unauthorized access. 6. Regularly audit plugin usage and remove unused or unsupported plugins to minimize attack surface. 7. Use security plugins that can detect and block CSRF attempts or anomalous admin requests. 8. Monitor web server and application logs for unusual POST requests to sm-options.php or unexpected changes in plugin settings. 9. Consider implementing Web Application Firewalls (WAF) with custom rules to detect and block CSRF attack patterns targeting this plugin.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-15T18:54:22.324Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689fff64ad5a09ad007439b9

Added to database: 8/16/2025, 3:47:48 AM

Last enriched: 8/16/2025, 4:04:40 AM

Last updated: 8/16/2025, 11:42:04 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats