CVE-2025-9631: CWE-352 Cross-Site Request Forgery (CSRF) in gyaku AutoCatSet
The AutoCatSet plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.4. This is due to missing or incorrect nonce validation on the autocatset_ajax function. This makes it possible for unauthenticated attackers to trigger automatic recategorization of posts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-9631 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the AutoCatSet plugin for WordPress, affecting all versions up to and including 2.1.4. The vulnerability stems from the autocatset_ajax function lacking proper nonce validation, which is a security token mechanism designed to verify that requests originate from legitimate users. Without this validation, attackers can craft malicious requests that, when executed by an authenticated administrator (via clicking a link or visiting a malicious webpage), trigger automatic recategorization of posts on the WordPress site. This recategorization can alter the organizational structure and metadata of content, potentially disrupting site navigation, SEO, or content management workflows. The vulnerability requires no privileges or authentication on the attacker’s part but does require user interaction by an administrator, limiting the attack vector to social engineering or phishing techniques. The CVSS v3.1 score of 4.3 reflects a medium severity, with the attack vector being network-based, low attack complexity, no privileges required, but user interaction necessary. The vulnerability impacts the integrity of the content categorization but does not affect confidentiality or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability was assigned and published by Wordfence and reserved in late August 2025.
Potential Impact
The primary impact of this vulnerability is on the integrity of WordPress site content categorization. Unauthorized automatic recategorization of posts can disrupt site structure, confuse users, degrade SEO rankings, and potentially cause administrative overhead to correct manipulated content. While it does not directly expose sensitive data or cause denial of service, the altered categorization can indirectly affect user trust and site usability. For organizations relying heavily on WordPress for content management, especially those with complex categorization schemes or e-commerce integrations, this could lead to operational disruptions. Since exploitation requires an administrator to interact with a malicious link, social engineering risks are elevated. Attackers could leverage this vulnerability as part of a broader attack chain to manipulate site content or prepare for further exploitation. The lack of known exploits reduces immediate risk but does not eliminate the potential for future attacks.
Mitigation Recommendations
To mitigate CVE-2025-9631, organizations should first check for updates or patches from the plugin vendor and apply them promptly once available. In the absence of an official patch, administrators can implement the following specific measures: (1) Restrict administrator access and educate admins about phishing and social engineering risks to reduce the chance of clicking malicious links. (2) Implement Web Application Firewall (WAF) rules to detect and block suspicious POST requests targeting the autocatset_ajax endpoint, especially those lacking valid nonce tokens. (3) Manually add nonce validation checks in the plugin code if feasible, ensuring that all AJAX requests verify the nonce before processing. (4) Limit exposure of the WordPress admin interface by IP whitelisting or VPN access to reduce attack surface. (5) Monitor logs for unusual recategorization activity or unexpected AJAX requests. (6) Regularly back up site content and categorization data to enable quick restoration if manipulation occurs. These targeted mitigations go beyond generic advice by focusing on the specific vulnerable function and attack vector.
Affected Countries
United States, India, Brazil, Germany, United Kingdom, Canada, Australia, France, Japan, Netherlands, Italy, Spain
CVE-2025-9631: CWE-352 Cross-Site Request Forgery (CSRF) in gyaku AutoCatSet
Description
The AutoCatSet plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.4. This is due to missing or incorrect nonce validation on the autocatset_ajax function. This makes it possible for unauthenticated attackers to trigger automatic recategorization of posts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-9631 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the AutoCatSet plugin for WordPress, affecting all versions up to and including 2.1.4. The vulnerability stems from the autocatset_ajax function lacking proper nonce validation, which is a security token mechanism designed to verify that requests originate from legitimate users. Without this validation, attackers can craft malicious requests that, when executed by an authenticated administrator (via clicking a link or visiting a malicious webpage), trigger automatic recategorization of posts on the WordPress site. This recategorization can alter the organizational structure and metadata of content, potentially disrupting site navigation, SEO, or content management workflows. The vulnerability requires no privileges or authentication on the attacker’s part but does require user interaction by an administrator, limiting the attack vector to social engineering or phishing techniques. The CVSS v3.1 score of 4.3 reflects a medium severity, with the attack vector being network-based, low attack complexity, no privileges required, but user interaction necessary. The vulnerability impacts the integrity of the content categorization but does not affect confidentiality or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability was assigned and published by Wordfence and reserved in late August 2025.
Potential Impact
The primary impact of this vulnerability is on the integrity of WordPress site content categorization. Unauthorized automatic recategorization of posts can disrupt site structure, confuse users, degrade SEO rankings, and potentially cause administrative overhead to correct manipulated content. While it does not directly expose sensitive data or cause denial of service, the altered categorization can indirectly affect user trust and site usability. For organizations relying heavily on WordPress for content management, especially those with complex categorization schemes or e-commerce integrations, this could lead to operational disruptions. Since exploitation requires an administrator to interact with a malicious link, social engineering risks are elevated. Attackers could leverage this vulnerability as part of a broader attack chain to manipulate site content or prepare for further exploitation. The lack of known exploits reduces immediate risk but does not eliminate the potential for future attacks.
Mitigation Recommendations
To mitigate CVE-2025-9631, organizations should first check for updates or patches from the plugin vendor and apply them promptly once available. In the absence of an official patch, administrators can implement the following specific measures: (1) Restrict administrator access and educate admins about phishing and social engineering risks to reduce the chance of clicking malicious links. (2) Implement Web Application Firewall (WAF) rules to detect and block suspicious POST requests targeting the autocatset_ajax endpoint, especially those lacking valid nonce tokens. (3) Manually add nonce validation checks in the plugin code if feasible, ensuring that all AJAX requests verify the nonce before processing. (4) Limit exposure of the WordPress admin interface by IP whitelisting or VPN access to reduce attack surface. (5) Monitor logs for unusual recategorization activity or unexpected AJAX requests. (6) Regularly back up site content and categorization data to enable quick restoration if manipulation occurs. These targeted mitigations go beyond generic advice by focusing on the specific vulnerable function and attack vector.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-28T19:54:00.766Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c27a22e1c560fa9d94d4b8
Added to database: 9/11/2025, 7:28:34 AM
Last enriched: 2/26/2026, 6:07:47 PM
Last updated: 3/23/2026, 8:57:04 AM
Views: 61
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.