CVE-2025-9631: CWE-352 Cross-Site Request Forgery (CSRF) in gyaku AutoCatSet
The AutoCatSet plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.4. This is due to missing or incorrect nonce validation on the autocatset_ajax function. This makes it possible for unauthenticated attackers to trigger automatic recategorization of posts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-9631 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the AutoCatSet plugin for WordPress, developed by the vendor 'gyaku'. This vulnerability exists in all versions up to and including 2.1.4 due to missing or incorrect nonce validation in the autocatset_ajax function. Nonces in WordPress are security tokens used to verify that requests are intentional and originate from legitimate users. The absence or improper implementation of nonce validation allows an unauthenticated attacker to craft a malicious request that, when executed by an authenticated site administrator (e.g., by clicking a link), triggers automatic recategorization of posts without the administrator's consent. This recategorization could alter the organization and classification of content on the website, potentially disrupting content management workflows or misleading site visitors. The vulnerability requires user interaction (the administrator must be tricked into performing an action), does not require authentication by the attacker, and does not affect confidentiality or availability directly but impacts the integrity of the website's content categorization. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the limited impact scope and the need for user interaction. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-352, which covers CSRF weaknesses where state-changing requests can be forged by attackers due to missing or incorrect anti-CSRF tokens.
Potential Impact
For European organizations using WordPress websites with the AutoCatSet plugin, this vulnerability could lead to unauthorized modification of post categorizations. While this does not directly compromise sensitive data confidentiality or availability, it undermines the integrity of website content management. This could result in misinformation, misclassification of content, or disruption of user navigation and SEO rankings. Organizations relying on accurate content categorization for compliance, customer information, or operational processes may face reputational damage or operational inefficiencies. Since the attack requires an administrator to be tricked into clicking a malicious link, social engineering risks increase. European organizations with public-facing WordPress sites, especially those in sectors like media, e-commerce, or government, where content integrity is critical, are at risk. The medium severity score suggests the threat is moderate but should not be ignored, especially in environments where content accuracy is essential.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately audit their WordPress installations for the presence of the AutoCatSet plugin and verify the version in use. If the plugin is installed and is version 2.1.4 or earlier, organizations should disable or remove the plugin until an official patch is released. In the absence of a patch, organizations with development resources can implement custom nonce validation in the autocatset_ajax function to ensure that all AJAX requests are properly authenticated and authorized. Additionally, administrators should be trained to recognize phishing attempts and avoid clicking on suspicious links, especially when logged into administrative accounts. Implementing Content Security Policy (CSP) headers to restrict the sources of executable scripts and using web application firewalls (WAFs) to detect and block suspicious requests can provide additional layers of defense. Regular backups of website content and configurations should be maintained to allow quick restoration if unauthorized changes occur. Monitoring logs for unusual recategorization activities can help detect exploitation attempts early.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-9631: CWE-352 Cross-Site Request Forgery (CSRF) in gyaku AutoCatSet
Description
The AutoCatSet plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.4. This is due to missing or incorrect nonce validation on the autocatset_ajax function. This makes it possible for unauthenticated attackers to trigger automatic recategorization of posts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2025-9631 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the AutoCatSet plugin for WordPress, developed by the vendor 'gyaku'. This vulnerability exists in all versions up to and including 2.1.4 due to missing or incorrect nonce validation in the autocatset_ajax function. Nonces in WordPress are security tokens used to verify that requests are intentional and originate from legitimate users. The absence or improper implementation of nonce validation allows an unauthenticated attacker to craft a malicious request that, when executed by an authenticated site administrator (e.g., by clicking a link), triggers automatic recategorization of posts without the administrator's consent. This recategorization could alter the organization and classification of content on the website, potentially disrupting content management workflows or misleading site visitors. The vulnerability requires user interaction (the administrator must be tricked into performing an action), does not require authentication by the attacker, and does not affect confidentiality or availability directly but impacts the integrity of the website's content categorization. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the limited impact scope and the need for user interaction. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-352, which covers CSRF weaknesses where state-changing requests can be forged by attackers due to missing or incorrect anti-CSRF tokens.
Potential Impact
For European organizations using WordPress websites with the AutoCatSet plugin, this vulnerability could lead to unauthorized modification of post categorizations. While this does not directly compromise sensitive data confidentiality or availability, it undermines the integrity of website content management. This could result in misinformation, misclassification of content, or disruption of user navigation and SEO rankings. Organizations relying on accurate content categorization for compliance, customer information, or operational processes may face reputational damage or operational inefficiencies. Since the attack requires an administrator to be tricked into clicking a malicious link, social engineering risks increase. European organizations with public-facing WordPress sites, especially those in sectors like media, e-commerce, or government, where content integrity is critical, are at risk. The medium severity score suggests the threat is moderate but should not be ignored, especially in environments where content accuracy is essential.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately audit their WordPress installations for the presence of the AutoCatSet plugin and verify the version in use. If the plugin is installed and is version 2.1.4 or earlier, organizations should disable or remove the plugin until an official patch is released. In the absence of a patch, organizations with development resources can implement custom nonce validation in the autocatset_ajax function to ensure that all AJAX requests are properly authenticated and authorized. Additionally, administrators should be trained to recognize phishing attempts and avoid clicking on suspicious links, especially when logged into administrative accounts. Implementing Content Security Policy (CSP) headers to restrict the sources of executable scripts and using web application firewalls (WAFs) to detect and block suspicious requests can provide additional layers of defense. Regular backups of website content and configurations should be maintained to allow quick restoration if unauthorized changes occur. Monitoring logs for unusual recategorization activities can help detect exploitation attempts early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-28T19:54:00.766Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c27a22e1c560fa9d94d4b8
Added to database: 9/11/2025, 7:28:34 AM
Last enriched: 9/11/2025, 7:32:50 AM
Last updated: 9/11/2025, 7:07:37 PM
Views: 3
Related Threats
CVE-2025-10271: Cross Site Scripting in erjinzhi 10OA
MediumCVE-2025-10127: CWE-640 in Daikin Security Gateway
HighCVE-2025-9018: CWE-862 Missing Authorization in germanpearls Time Tracker
HighCVE-2025-48041: CWE-770 Allocation of Resources Without Limits or Throttling in Erlang OTP
HighCVE-2025-48040: CWE-400 Uncontrolled Resource Consumption in Erlang OTP
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.