CVE-2025-9627: CWE-352 Cross-Site Request Forgery (CSRF) in izem Run Log
The Run Log plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.7.10. This is due to missing or incorrect nonce validation on the oirl_plugin_options function. This makes it possible for unauthenticated attackers to modify plugin settings including distance units, pace display preferences, style themes, and display positions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-9627 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the Run Log plugin for WordPress, specifically all versions up to and including 1.7.10. The vulnerability arises due to missing or incorrect nonce validation in the oirl_plugin_options function. Nonces in WordPress are security tokens used to verify that a request comes from a legitimate source, typically to prevent CSRF attacks. Because this validation is absent or improperly implemented, an attacker can craft a malicious request that, when executed by an authenticated site administrator (for example, by clicking a link), can modify plugin settings without the administrator’s explicit consent. The settings that can be altered include distance units, pace display preferences, style themes, and display positions. Although the attacker cannot directly execute commands or access sensitive data, they can manipulate the plugin’s configuration, potentially degrading user experience or causing confusion. The vulnerability requires no prior authentication but does require user interaction (the administrator must be tricked into performing an action). The CVSS v3.1 base score is 4.3, indicating a medium severity level, with an attack vector of network, low attack complexity, no privileges required, user interaction required, and impact limited to integrity (no confidentiality or availability impact). There are no known exploits in the wild as of the published date, and no patches have been linked yet. The vulnerability is classified under CWE-352, which covers CSRF issues.
Potential Impact
For European organizations using WordPress sites with the Run Log plugin installed, this vulnerability could lead to unauthorized changes in plugin settings by attackers who manage to trick site administrators into clicking malicious links. While the direct impact on confidentiality and availability is minimal, the integrity of the plugin’s configuration can be compromised. This could result in altered display units or themes that confuse end users or degrade the user experience, potentially undermining trust in the affected website. In environments where accurate data presentation is critical (e.g., fitness or health-related services relying on Run Log data), such unauthorized changes could mislead users or disrupt service consistency. Additionally, if attackers combine this vulnerability with other weaknesses, they might use it as a foothold for more complex attacks. The requirement for user interaction and administrator involvement limits the scope somewhat but does not eliminate risk, especially in organizations with less security-aware staff. Given the widespread use of WordPress across Europe, and the popularity of fitness and activity tracking plugins, the threat is relevant but not critical.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify if the Run Log plugin is in use and determine its version. Until an official patch is released, administrators should consider disabling or uninstalling the Run Log plugin to eliminate exposure. If disabling is not feasible, organizations should implement compensating controls such as restricting administrative access to trusted networks or VPNs, enforcing multi-factor authentication (MFA) for administrator accounts, and educating administrators about the risks of clicking unknown or suspicious links. Web Application Firewalls (WAFs) can be configured to detect and block suspicious POST requests targeting the plugin’s options endpoint. Monitoring administrative actions and plugin configuration changes can help detect exploitation attempts. Once a patch is available, prompt application of updates is essential. Additionally, developers and site owners should verify nonce implementation in custom plugins and themes to prevent similar CSRF vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-9627: CWE-352 Cross-Site Request Forgery (CSRF) in izem Run Log
Description
The Run Log plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.7.10. This is due to missing or incorrect nonce validation on the oirl_plugin_options function. This makes it possible for unauthenticated attackers to modify plugin settings including distance units, pace display preferences, style themes, and display positions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2025-9627 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the Run Log plugin for WordPress, specifically all versions up to and including 1.7.10. The vulnerability arises due to missing or incorrect nonce validation in the oirl_plugin_options function. Nonces in WordPress are security tokens used to verify that a request comes from a legitimate source, typically to prevent CSRF attacks. Because this validation is absent or improperly implemented, an attacker can craft a malicious request that, when executed by an authenticated site administrator (for example, by clicking a link), can modify plugin settings without the administrator’s explicit consent. The settings that can be altered include distance units, pace display preferences, style themes, and display positions. Although the attacker cannot directly execute commands or access sensitive data, they can manipulate the plugin’s configuration, potentially degrading user experience or causing confusion. The vulnerability requires no prior authentication but does require user interaction (the administrator must be tricked into performing an action). The CVSS v3.1 base score is 4.3, indicating a medium severity level, with an attack vector of network, low attack complexity, no privileges required, user interaction required, and impact limited to integrity (no confidentiality or availability impact). There are no known exploits in the wild as of the published date, and no patches have been linked yet. The vulnerability is classified under CWE-352, which covers CSRF issues.
Potential Impact
For European organizations using WordPress sites with the Run Log plugin installed, this vulnerability could lead to unauthorized changes in plugin settings by attackers who manage to trick site administrators into clicking malicious links. While the direct impact on confidentiality and availability is minimal, the integrity of the plugin’s configuration can be compromised. This could result in altered display units or themes that confuse end users or degrade the user experience, potentially undermining trust in the affected website. In environments where accurate data presentation is critical (e.g., fitness or health-related services relying on Run Log data), such unauthorized changes could mislead users or disrupt service consistency. Additionally, if attackers combine this vulnerability with other weaknesses, they might use it as a foothold for more complex attacks. The requirement for user interaction and administrator involvement limits the scope somewhat but does not eliminate risk, especially in organizations with less security-aware staff. Given the widespread use of WordPress across Europe, and the popularity of fitness and activity tracking plugins, the threat is relevant but not critical.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify if the Run Log plugin is in use and determine its version. Until an official patch is released, administrators should consider disabling or uninstalling the Run Log plugin to eliminate exposure. If disabling is not feasible, organizations should implement compensating controls such as restricting administrative access to trusted networks or VPNs, enforcing multi-factor authentication (MFA) for administrator accounts, and educating administrators about the risks of clicking unknown or suspicious links. Web Application Firewalls (WAFs) can be configured to detect and block suspicious POST requests targeting the plugin’s options endpoint. Monitoring administrative actions and plugin configuration changes can help detect exploitation attempts. Once a patch is available, prompt application of updates is essential. Additionally, developers and site owners should verify nonce implementation in custom plugins and themes to prevent similar CSRF vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-28T19:25:26.321Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c27a22e1c560fa9d94d4af
Added to database: 9/11/2025, 7:28:34 AM
Last enriched: 9/11/2025, 7:33:11 AM
Last updated: 9/11/2025, 7:07:37 PM
Views: 3
Related Threats
CVE-2025-10127: CWE-640 in Daikin Security Gateway
HighCVE-2025-9018: CWE-862 Missing Authorization in germanpearls Time Tracker
HighCVE-2025-48041: CWE-770 Allocation of Resources Without Limits or Throttling in Erlang OTP
HighCVE-2025-48040: CWE-400 Uncontrolled Resource Consumption in Erlang OTP
MediumCVE-2025-48039: CWE-770 Allocation of Resources Without Limits or Throttling in Erlang OTP
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.