Skip to main content

CVE-2025-9623: CWE-352 Cross-Site Request Forgery (CSRF) in dontcare Admin in English with Switch

Medium
VulnerabilityCVE-2025-9623cvecve-2025-9623cwe-352
Published: Thu Sep 11 2025 (09/11/2025, 07:24:57 UTC)
Source: CVE Database V5
Vendor/Project: dontcare
Product: Admin in English with Switch

Description

The Admin in English with Switch plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1. This is due to missing or incorrect nonce validation on the enable_eng function. This makes it possible for unauthenticated attackers to modify administrator language settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 09/11/2025, 07:33:22 UTC

Technical Analysis

CVE-2025-9623 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the WordPress plugin 'Admin in English with Switch' developed by dontcare. This vulnerability exists in all versions up to and including version 1.1 due to missing or incorrect nonce validation in the 'enable_eng' function. Nonces in WordPress are security tokens used to verify that a request comes from a legitimate source. The absence or improper implementation of nonce validation allows an attacker to craft a malicious request that, when executed by an authenticated administrator (e.g., by clicking a link), can change the administrator's language settings without their consent. Although the vulnerability does not directly compromise confidentiality or availability, it impacts the integrity of the administrator's settings. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges, but does require user interaction (the administrator must be tricked into clicking a malicious link). There are no known exploits in the wild at this time, and no patches have been published yet. The vulnerability is classified under CWE-352, which is a common web security weakness related to CSRF attacks. Given that this vulnerability affects a WordPress plugin, it is relevant to any WordPress site using this plugin, regardless of the hosting environment. The attack scope is limited to modifying language settings, which may seem minor but could be leveraged as part of a broader attack chain or cause administrative confusion and misconfiguration.

Potential Impact

For European organizations, the impact of CVE-2025-9623 primarily concerns the integrity of administrative settings on WordPress sites using the vulnerable plugin. While the direct impact is limited to changing language preferences, this could lead to administrative errors, miscommunication, or reduced usability for site administrators. In some cases, altering language settings might be used as a stepping stone for social engineering or to mask further malicious activities by confusing administrators. Organizations relying heavily on WordPress for their web presence, especially those with multilingual content or administrative teams using this plugin, could face operational disruptions. Although the vulnerability does not directly expose sensitive data or cause service outages, the potential for misuse in targeted attacks or combined with other vulnerabilities should not be underestimated. Additionally, given the widespread use of WordPress in Europe, even a medium-severity vulnerability can have significant cumulative effects if exploited at scale.

Mitigation Recommendations

Since no official patch is currently available, European organizations should take immediate steps to mitigate this vulnerability. First, disable or uninstall the 'Admin in English with Switch' plugin until a secure version is released. If the plugin is essential, restrict administrative access to trusted networks or VPNs to reduce exposure. Implement strict Content Security Policy (CSP) headers to limit the ability of attackers to execute malicious scripts that could trigger CSRF attacks. Educate administrators about the risks of clicking unsolicited links, especially when logged into administrative accounts. Monitor web server logs for suspicious requests targeting the 'enable_eng' function or unusual changes in language settings. Once a patch is released, prioritize updating the plugin promptly. Additionally, consider deploying Web Application Firewalls (WAFs) with rules to detect and block CSRF attempts targeting this plugin's endpoints. Finally, review and harden nonce implementations across all custom plugins and themes to prevent similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-28T19:07:55.509Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c27a22e1c560fa9d94d4aa

Added to database: 9/11/2025, 7:28:34 AM

Last enriched: 9/11/2025, 7:33:22 AM

Last updated: 9/11/2025, 7:07:37 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats