CVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)
The weichuncai(WP伪春菜) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5. This is due to missing or incorrect nonce validation on the sm-options.php page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-7686 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the weichuncai (WP伪春菜) WordPress plugin, versions up to and including 1.5. The root cause is the absence or improper implementation of nonce validation on the sm-options.php page, which is responsible for handling plugin settings. This flaw allows an unauthenticated attacker to craft a malicious request that, if executed by an authenticated site administrator (e.g., by clicking a link or visiting a malicious webpage), can update plugin settings and inject malicious web scripts. The vulnerability leverages the trust relationship between the administrator's browser and the WordPress site, enabling unauthorized changes without direct authentication or elevated privileges. The CVSS v3.1 score of 6.1 reflects a medium severity, with an attack vector of network (remote), low attack complexity, no privileges required, but requiring user interaction (UI:R). The impact includes limited confidentiality and integrity loss, as attackers can alter plugin configurations and inject scripts, potentially leading to further compromise or persistent malicious code execution within the WordPress environment. No known exploits are currently reported in the wild, and no patches have been published at the time of this report. This vulnerability is classified under CWE-352, a common web application security weakness related to CSRF attacks.
Potential Impact
For European organizations using the weichuncai WordPress plugin, this vulnerability poses a risk primarily to the integrity and confidentiality of their web applications. Successful exploitation could allow attackers to modify plugin settings and inject malicious scripts, potentially leading to unauthorized data exposure, session hijacking, or further compromise of the website and its users. This can damage organizational reputation, lead to regulatory non-compliance (especially under GDPR if personal data is exposed), and disrupt business operations relying on the affected WordPress sites. Given that the attack requires tricking an administrator into interaction, social engineering risks are elevated. Organizations with public-facing WordPress sites that use this plugin are particularly vulnerable, as attackers can target administrators through phishing or malicious links. The lack of available patches increases the urgency for mitigation. While the vulnerability does not directly impact availability, the integrity and confidentiality risks can have significant operational and legal consequences for European entities.
Mitigation Recommendations
1. Immediately audit WordPress sites to identify installations of the weichuncai (WP伪春菜) plugin, especially versions up to 1.5. 2. Until an official patch is released, restrict administrative access to trusted networks or VPNs to reduce exposure to CSRF attacks. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious POST requests targeting sm-options.php or related plugin endpoints. 4. Educate site administrators on the risks of clicking untrusted links or visiting unknown websites while logged into WordPress admin panels to reduce the risk of social engineering. 5. Employ browser security features such as SameSite cookies to mitigate CSRF risks where possible. 6. Monitor logs for unusual changes to plugin settings or unexpected administrative actions. 7. Once available, promptly apply official patches or updates from the plugin vendor. 8. Consider temporarily disabling or removing the plugin if it is not critical to operations until a secure version is available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)
Description
The weichuncai(WP伪春菜) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5. This is due to missing or incorrect nonce validation on the sm-options.php page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2025-7686 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the weichuncai (WP伪春菜) WordPress plugin, versions up to and including 1.5. The root cause is the absence or improper implementation of nonce validation on the sm-options.php page, which is responsible for handling plugin settings. This flaw allows an unauthenticated attacker to craft a malicious request that, if executed by an authenticated site administrator (e.g., by clicking a link or visiting a malicious webpage), can update plugin settings and inject malicious web scripts. The vulnerability leverages the trust relationship between the administrator's browser and the WordPress site, enabling unauthorized changes without direct authentication or elevated privileges. The CVSS v3.1 score of 6.1 reflects a medium severity, with an attack vector of network (remote), low attack complexity, no privileges required, but requiring user interaction (UI:R). The impact includes limited confidentiality and integrity loss, as attackers can alter plugin configurations and inject scripts, potentially leading to further compromise or persistent malicious code execution within the WordPress environment. No known exploits are currently reported in the wild, and no patches have been published at the time of this report. This vulnerability is classified under CWE-352, a common web application security weakness related to CSRF attacks.
Potential Impact
For European organizations using the weichuncai WordPress plugin, this vulnerability poses a risk primarily to the integrity and confidentiality of their web applications. Successful exploitation could allow attackers to modify plugin settings and inject malicious scripts, potentially leading to unauthorized data exposure, session hijacking, or further compromise of the website and its users. This can damage organizational reputation, lead to regulatory non-compliance (especially under GDPR if personal data is exposed), and disrupt business operations relying on the affected WordPress sites. Given that the attack requires tricking an administrator into interaction, social engineering risks are elevated. Organizations with public-facing WordPress sites that use this plugin are particularly vulnerable, as attackers can target administrators through phishing or malicious links. The lack of available patches increases the urgency for mitigation. While the vulnerability does not directly impact availability, the integrity and confidentiality risks can have significant operational and legal consequences for European entities.
Mitigation Recommendations
1. Immediately audit WordPress sites to identify installations of the weichuncai (WP伪春菜) plugin, especially versions up to 1.5. 2. Until an official patch is released, restrict administrative access to trusted networks or VPNs to reduce exposure to CSRF attacks. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious POST requests targeting sm-options.php or related plugin endpoints. 4. Educate site administrators on the risks of clicking untrusted links or visiting unknown websites while logged into WordPress admin panels to reduce the risk of social engineering. 5. Employ browser security features such as SameSite cookies to mitigate CSRF risks where possible. 6. Monitor logs for unusual changes to plugin settings or unexpected administrative actions. 7. Once available, promptly apply official patches or updates from the plugin vendor. 8. Consider temporarily disabling or removing the plugin if it is not critical to operations until a secure version is available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-15T18:54:22.324Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689fff64ad5a09ad007439b9
Added to database: 8/16/2025, 3:47:48 AM
Last enriched: 8/24/2025, 1:07:59 AM
Last updated: 9/28/2025, 1:38:18 AM
Views: 42
Related Threats
CVE-2025-43818: CWE-79: Cross-site Scripting in Liferay Portal
MediumCVE-2025-43815: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-30247: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Western Digital My Cloud
CriticalCVE-2025-34235: CWE-295 Improper Certificate Validation in Vasion Print Virtual Appliance Host
CriticalCVE-2025-34233: CWE‑693 Protection Mechanism Failure in Vasion Print Virtual Appliance Host
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.