CVE-2025-9627: CWE-352 Cross-Site Request Forgery (CSRF) in izem Run Log
The Run Log plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.7.10. This is due to missing or incorrect nonce validation on the oirl_plugin_options function. This makes it possible for unauthenticated attackers to modify plugin settings including distance units, pace display preferences, style themes, and display positions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-9627 is a medium severity Cross-Site Request Forgery (CSRF) vulnerability identified in the izem Run Log plugin for WordPress, affecting all versions up to and including 1.7.10. The vulnerability is due to missing or incorrect nonce validation in the oirl_plugin_options function, which is responsible for handling plugin configuration changes. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and prevent CSRF attacks. Without proper nonce validation, an attacker can craft a malicious link or webpage that, when visited by a site administrator, causes unintended changes to the plugin’s settings. These changes include modifying distance units, pace display preferences, style themes, and display positions. The attack does not require the attacker to be authenticated, but it does require the administrator to interact with the malicious content (e.g., clicking a link). The vulnerability impacts the integrity of the plugin’s configuration but does not affect confidentiality or availability. The CVSS 3.1 base score is 4.3, reflecting a network attack vector, low attack complexity, no privileges required, user interaction required, and limited impact on integrity only. No public exploits have been reported yet, and no official patches are linked in the provided information. The vulnerability was published on September 11, 2025, and assigned by Wordfence. Organizations using this plugin should urgently verify their version and apply fixes or mitigations to prevent unauthorized configuration changes that could affect user experience or site behavior.
Potential Impact
The primary impact of this vulnerability is the unauthorized modification of plugin settings, which compromises the integrity of the affected WordPress site’s configuration. Although this does not directly expose sensitive data or disrupt service availability, altered settings could degrade user experience, cause confusion, or potentially facilitate further attacks if the changed configurations weaken security posture or enable other vulnerabilities. Since the attack requires an administrator to interact with a malicious link, the risk is somewhat mitigated by user awareness but remains significant in environments with multiple administrators or less security-conscious users. Organizations relying on the izem Run Log plugin for fitness tracking or related functionalities may experience inconsistent or incorrect display of data, which could undermine trust in the site. The vulnerability’s medium severity score reflects these factors. No known exploits in the wild reduce immediate risk, but the potential for targeted attacks against high-value WordPress sites remains.
Mitigation Recommendations
1. Immediately verify the version of the izem Run Log plugin in use and upgrade to a patched version once available. 2. If no patch is currently released, implement manual nonce validation in the oirl_plugin_options function to ensure all requests modifying plugin settings include a valid nonce token. 3. Educate site administrators about the risks of clicking untrusted links, especially when logged into WordPress admin interfaces. 4. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce CSRF attack vectors. 5. Use security plugins that provide additional CSRF protections or monitor for suspicious administrative actions. 6. Regularly audit plugin configurations and logs for unauthorized changes. 7. Limit the number of administrators and enforce strong authentication methods such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. 8. Monitor threat intelligence sources for updates on exploits or patches related to this vulnerability.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Japan, France, Netherlands, Brazil, India
CVE-2025-9627: CWE-352 Cross-Site Request Forgery (CSRF) in izem Run Log
Description
The Run Log plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.7.10. This is due to missing or incorrect nonce validation on the oirl_plugin_options function. This makes it possible for unauthenticated attackers to modify plugin settings including distance units, pace display preferences, style themes, and display positions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-9627 is a medium severity Cross-Site Request Forgery (CSRF) vulnerability identified in the izem Run Log plugin for WordPress, affecting all versions up to and including 1.7.10. The vulnerability is due to missing or incorrect nonce validation in the oirl_plugin_options function, which is responsible for handling plugin configuration changes. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and prevent CSRF attacks. Without proper nonce validation, an attacker can craft a malicious link or webpage that, when visited by a site administrator, causes unintended changes to the plugin’s settings. These changes include modifying distance units, pace display preferences, style themes, and display positions. The attack does not require the attacker to be authenticated, but it does require the administrator to interact with the malicious content (e.g., clicking a link). The vulnerability impacts the integrity of the plugin’s configuration but does not affect confidentiality or availability. The CVSS 3.1 base score is 4.3, reflecting a network attack vector, low attack complexity, no privileges required, user interaction required, and limited impact on integrity only. No public exploits have been reported yet, and no official patches are linked in the provided information. The vulnerability was published on September 11, 2025, and assigned by Wordfence. Organizations using this plugin should urgently verify their version and apply fixes or mitigations to prevent unauthorized configuration changes that could affect user experience or site behavior.
Potential Impact
The primary impact of this vulnerability is the unauthorized modification of plugin settings, which compromises the integrity of the affected WordPress site’s configuration. Although this does not directly expose sensitive data or disrupt service availability, altered settings could degrade user experience, cause confusion, or potentially facilitate further attacks if the changed configurations weaken security posture or enable other vulnerabilities. Since the attack requires an administrator to interact with a malicious link, the risk is somewhat mitigated by user awareness but remains significant in environments with multiple administrators or less security-conscious users. Organizations relying on the izem Run Log plugin for fitness tracking or related functionalities may experience inconsistent or incorrect display of data, which could undermine trust in the site. The vulnerability’s medium severity score reflects these factors. No known exploits in the wild reduce immediate risk, but the potential for targeted attacks against high-value WordPress sites remains.
Mitigation Recommendations
1. Immediately verify the version of the izem Run Log plugin in use and upgrade to a patched version once available. 2. If no patch is currently released, implement manual nonce validation in the oirl_plugin_options function to ensure all requests modifying plugin settings include a valid nonce token. 3. Educate site administrators about the risks of clicking untrusted links, especially when logged into WordPress admin interfaces. 4. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce CSRF attack vectors. 5. Use security plugins that provide additional CSRF protections or monitor for suspicious administrative actions. 6. Regularly audit plugin configurations and logs for unauthorized changes. 7. Limit the number of administrators and enforce strong authentication methods such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. 8. Monitor threat intelligence sources for updates on exploits or patches related to this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-28T19:25:26.321Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c27a22e1c560fa9d94d4af
Added to database: 9/11/2025, 7:28:34 AM
Last enriched: 2/26/2026, 6:06:43 PM
Last updated: 3/25/2026, 5:49:58 AM
Views: 59
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.