CVE-2025-8423: CWE-862 Missing Authorization in mythemeshop My WP Translate
The My WP Translate plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the mtswpt_remove_plugin() and ajax_update_export_code() functions in all versions up to, and including, 1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read and delete arbitrary WordPress options which can cause a denial of service.
AI Analysis
Technical Summary
CVE-2025-8423 is a medium-severity vulnerability affecting the My WP Translate plugin developed by mythemeshop for WordPress. The vulnerability arises from a missing authorization check (CWE-862) in two key functions: mtswpt_remove_plugin() and ajax_update_export_code(). These functions lack proper capability verification, allowing authenticated users with Subscriber-level privileges or higher to perform unauthorized actions. Specifically, attackers can read and delete arbitrary WordPress options, which are critical configuration settings stored in the WordPress database. The unauthorized deletion or modification of these options can disrupt the normal operation of the WordPress site, potentially leading to denial of service (DoS) conditions. The vulnerability affects all versions of the plugin up to and including version 1.1. The CVSS 3.1 base score is 5.4, reflecting a medium severity level, with an attack vector of network (remote exploitation), low attack complexity, requiring low privileges (authenticated Subscriber or higher), no user interaction, and impacting availability and integrity but not confidentiality. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is significant because Subscriber-level access is commonly granted to registered users on many WordPress sites, meaning an attacker does not need administrative privileges to exploit it. The ability to delete or modify WordPress options can cause site instability, loss of functionality, or downtime, impacting website availability and integrity of configuration data.
Potential Impact
For European organizations using WordPress sites with the My WP Translate plugin, this vulnerability poses a risk of service disruption and potential damage to site configuration integrity. Many European businesses, government agencies, and NGOs rely on WordPress for their web presence, and the ability for low-privileged users to delete critical options could lead to denial of service, loss of trust, and operational interruptions. This is particularly impactful for organizations with public-facing websites or those that use WordPress for internal portals where Subscriber-level accounts are common. The vulnerability does not directly expose confidential data but compromises site availability and integrity, which can indirectly affect business continuity and reputation. Given the widespread use of WordPress in Europe and the common practice of allowing user registrations with Subscriber roles, the threat surface is significant. Additionally, organizations in regulated sectors (e.g., finance, healthcare) may face compliance risks if website availability or integrity is compromised. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for targeted attacks, especially as exploit code could be developed given the low complexity of exploitation.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the My WP Translate plugin and verify the version in use. Until an official patch is released, administrators should consider disabling or removing the plugin if it is not essential. If the plugin is required, restrict Subscriber-level user registrations or elevate the minimum required user role for sensitive actions to prevent exploitation. Implement additional access control measures such as web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable functions. Regularly back up WordPress options and site configurations to enable rapid restoration in case of unauthorized changes. Monitor logs for unusual activity from Subscriber accounts, including attempts to invoke plugin-specific AJAX actions. Educate site administrators about the risk and encourage prompt updates once a patch becomes available. Finally, consider applying the principle of least privilege by reviewing and minimizing user roles and capabilities across the WordPress environment.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-8423: CWE-862 Missing Authorization in mythemeshop My WP Translate
Description
The My WP Translate plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the mtswpt_remove_plugin() and ajax_update_export_code() functions in all versions up to, and including, 1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read and delete arbitrary WordPress options which can cause a denial of service.
AI-Powered Analysis
Technical Analysis
CVE-2025-8423 is a medium-severity vulnerability affecting the My WP Translate plugin developed by mythemeshop for WordPress. The vulnerability arises from a missing authorization check (CWE-862) in two key functions: mtswpt_remove_plugin() and ajax_update_export_code(). These functions lack proper capability verification, allowing authenticated users with Subscriber-level privileges or higher to perform unauthorized actions. Specifically, attackers can read and delete arbitrary WordPress options, which are critical configuration settings stored in the WordPress database. The unauthorized deletion or modification of these options can disrupt the normal operation of the WordPress site, potentially leading to denial of service (DoS) conditions. The vulnerability affects all versions of the plugin up to and including version 1.1. The CVSS 3.1 base score is 5.4, reflecting a medium severity level, with an attack vector of network (remote exploitation), low attack complexity, requiring low privileges (authenticated Subscriber or higher), no user interaction, and impacting availability and integrity but not confidentiality. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is significant because Subscriber-level access is commonly granted to registered users on many WordPress sites, meaning an attacker does not need administrative privileges to exploit it. The ability to delete or modify WordPress options can cause site instability, loss of functionality, or downtime, impacting website availability and integrity of configuration data.
Potential Impact
For European organizations using WordPress sites with the My WP Translate plugin, this vulnerability poses a risk of service disruption and potential damage to site configuration integrity. Many European businesses, government agencies, and NGOs rely on WordPress for their web presence, and the ability for low-privileged users to delete critical options could lead to denial of service, loss of trust, and operational interruptions. This is particularly impactful for organizations with public-facing websites or those that use WordPress for internal portals where Subscriber-level accounts are common. The vulnerability does not directly expose confidential data but compromises site availability and integrity, which can indirectly affect business continuity and reputation. Given the widespread use of WordPress in Europe and the common practice of allowing user registrations with Subscriber roles, the threat surface is significant. Additionally, organizations in regulated sectors (e.g., finance, healthcare) may face compliance risks if website availability or integrity is compromised. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for targeted attacks, especially as exploit code could be developed given the low complexity of exploitation.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the My WP Translate plugin and verify the version in use. Until an official patch is released, administrators should consider disabling or removing the plugin if it is not essential. If the plugin is required, restrict Subscriber-level user registrations or elevate the minimum required user role for sensitive actions to prevent exploitation. Implement additional access control measures such as web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable functions. Regularly back up WordPress options and site configurations to enable rapid restoration in case of unauthorized changes. Monitor logs for unusual activity from Subscriber accounts, including attempts to invoke plugin-specific AJAX actions. Educate site administrators about the risk and encourage prompt updates once a patch becomes available. Finally, consider applying the principle of least privilege by reviewing and minimizing user roles and capabilities across the WordPress environment.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-31T15:11:46.654Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c27a21e1c560fa9d94d446
Added to database: 9/11/2025, 7:28:33 AM
Last enriched: 9/11/2025, 7:37:06 AM
Last updated: 9/11/2025, 7:37:06 AM
Views: 2
Related Threats
CVE-2025-58321: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Delta Electronics DIALink
CriticalCVE-2025-58320: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Delta Electronics DIALink
HighCVE-2025-9874: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in webcodingplace Ultimate Classified Listings
HighCVE-2025-9861: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in livingos ThemeLoom Widgets
MediumCVE-2025-9860: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in natata7 Mixtape
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.