CVE-2025-9623: CWE-352 Cross-Site Request Forgery (CSRF) in dontcare Admin in English with Switch
The Admin in English with Switch plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1. This is due to missing or incorrect nonce validation on the enable_eng function. This makes it possible for unauthenticated attackers to modify administrator language settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-9623 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the WordPress plugin 'Admin in English with Switch' developed by dontcare. This vulnerability exists in all versions up to and including version 1.1 due to missing or incorrect nonce validation in the 'enable_eng' function. Nonces in WordPress are security tokens used to verify that a request comes from a legitimate source. The absence or improper implementation of nonce validation allows an attacker to craft a malicious request that, when executed by an authenticated administrator (e.g., by clicking a link), can change the administrator's language settings without their consent. Although the vulnerability does not directly compromise confidentiality or availability, it impacts the integrity of the administrator's settings. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges, but does require user interaction (the administrator must be tricked into clicking a malicious link). There are no known exploits in the wild at this time, and no patches have been published yet. The vulnerability is classified under CWE-352, which is a common web security weakness related to CSRF attacks. Given that this vulnerability affects a WordPress plugin, it is relevant to any WordPress site using this plugin, regardless of the hosting environment. The attack scope is limited to modifying language settings, which may seem minor but could be leveraged as part of a broader attack chain or cause administrative confusion and misconfiguration.
Potential Impact
For European organizations, the impact of CVE-2025-9623 primarily concerns the integrity of administrative settings on WordPress sites using the vulnerable plugin. While the direct impact is limited to changing language preferences, this could lead to administrative errors, miscommunication, or reduced usability for site administrators. In some cases, altering language settings might be used as a stepping stone for social engineering or to mask further malicious activities by confusing administrators. Organizations relying heavily on WordPress for their web presence, especially those with multilingual content or administrative teams using this plugin, could face operational disruptions. Although the vulnerability does not directly expose sensitive data or cause service outages, the potential for misuse in targeted attacks or combined with other vulnerabilities should not be underestimated. Additionally, given the widespread use of WordPress in Europe, even a medium-severity vulnerability can have significant cumulative effects if exploited at scale.
Mitigation Recommendations
Since no official patch is currently available, European organizations should take immediate steps to mitigate this vulnerability. First, disable or uninstall the 'Admin in English with Switch' plugin until a secure version is released. If the plugin is essential, restrict administrative access to trusted networks or VPNs to reduce exposure. Implement strict Content Security Policy (CSP) headers to limit the ability of attackers to execute malicious scripts that could trigger CSRF attacks. Educate administrators about the risks of clicking unsolicited links, especially when logged into administrative accounts. Monitor web server logs for suspicious requests targeting the 'enable_eng' function or unusual changes in language settings. Once a patch is released, prioritize updating the plugin promptly. Additionally, consider deploying Web Application Firewalls (WAFs) with rules to detect and block CSRF attempts targeting this plugin's endpoints. Finally, review and harden nonce implementations across all custom plugins and themes to prevent similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-9623: CWE-352 Cross-Site Request Forgery (CSRF) in dontcare Admin in English with Switch
Description
The Admin in English with Switch plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1. This is due to missing or incorrect nonce validation on the enable_eng function. This makes it possible for unauthenticated attackers to modify administrator language settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2025-9623 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the WordPress plugin 'Admin in English with Switch' developed by dontcare. This vulnerability exists in all versions up to and including version 1.1 due to missing or incorrect nonce validation in the 'enable_eng' function. Nonces in WordPress are security tokens used to verify that a request comes from a legitimate source. The absence or improper implementation of nonce validation allows an attacker to craft a malicious request that, when executed by an authenticated administrator (e.g., by clicking a link), can change the administrator's language settings without their consent. Although the vulnerability does not directly compromise confidentiality or availability, it impacts the integrity of the administrator's settings. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges, but does require user interaction (the administrator must be tricked into clicking a malicious link). There are no known exploits in the wild at this time, and no patches have been published yet. The vulnerability is classified under CWE-352, which is a common web security weakness related to CSRF attacks. Given that this vulnerability affects a WordPress plugin, it is relevant to any WordPress site using this plugin, regardless of the hosting environment. The attack scope is limited to modifying language settings, which may seem minor but could be leveraged as part of a broader attack chain or cause administrative confusion and misconfiguration.
Potential Impact
For European organizations, the impact of CVE-2025-9623 primarily concerns the integrity of administrative settings on WordPress sites using the vulnerable plugin. While the direct impact is limited to changing language preferences, this could lead to administrative errors, miscommunication, or reduced usability for site administrators. In some cases, altering language settings might be used as a stepping stone for social engineering or to mask further malicious activities by confusing administrators. Organizations relying heavily on WordPress for their web presence, especially those with multilingual content or administrative teams using this plugin, could face operational disruptions. Although the vulnerability does not directly expose sensitive data or cause service outages, the potential for misuse in targeted attacks or combined with other vulnerabilities should not be underestimated. Additionally, given the widespread use of WordPress in Europe, even a medium-severity vulnerability can have significant cumulative effects if exploited at scale.
Mitigation Recommendations
Since no official patch is currently available, European organizations should take immediate steps to mitigate this vulnerability. First, disable or uninstall the 'Admin in English with Switch' plugin until a secure version is released. If the plugin is essential, restrict administrative access to trusted networks or VPNs to reduce exposure. Implement strict Content Security Policy (CSP) headers to limit the ability of attackers to execute malicious scripts that could trigger CSRF attacks. Educate administrators about the risks of clicking unsolicited links, especially when logged into administrative accounts. Monitor web server logs for suspicious requests targeting the 'enable_eng' function or unusual changes in language settings. Once a patch is released, prioritize updating the plugin promptly. Additionally, consider deploying Web Application Firewalls (WAFs) with rules to detect and block CSRF attempts targeting this plugin's endpoints. Finally, review and harden nonce implementations across all custom plugins and themes to prevent similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-28T19:07:55.509Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c27a22e1c560fa9d94d4aa
Added to database: 9/11/2025, 7:28:34 AM
Last enriched: 9/11/2025, 7:33:22 AM
Last updated: 9/11/2025, 7:07:37 PM
Views: 3
Related Threats
CVE-2025-10272: Cross Site Scripting in erjinzhi 10OA
MediumCVE-2025-10271: Cross Site Scripting in erjinzhi 10OA
MediumCVE-2025-10127: CWE-640 in Daikin Security Gateway
HighCVE-2025-9018: CWE-862 Missing Authorization in germanpearls Time Tracker
HighCVE-2025-48041: CWE-770 Allocation of Resources Without Limits or Throttling in Erlang OTP
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.