Description
Cross-Site Request Forgery (CSRF) vulnerability in theode Language Field language-field allows Stored XSS.This issue affects Language Field: from n/a through <= 0.9.
Published: 2025-04-09
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a Cross‑Site Request Forgery weakness that allows an attacker to insert malicious script content into the language‑field plugin’s storage. If an attacker succeeds, the stored JavaScript can execute in the browsers of visitors who view the affected content, potentially leading to credential theft, session hijacking or defacement. The flaw is rooted in improper validation of request tokens and is classified as CWE‑352.

Affected Systems

WordPress sites running theode’s Language Field plugin, any version through 0.9 inclusive. The absence of version data for earlier releases indicates the issue persists up until the last listed version.

Risk and Exploitability

The CVSS score of 7.1 indicates a high severity aligned with the potential impact. However, the EPSS score of less than 1% suggests a low probability of active exploitation at this time, and the vulnerability is not yet catalogued in CISA’s KEV list. Likely attack vectors involve a logged‑in administrator or editor who unknowingly submits a crafted form that the plugin processes without adequate CSRF checks. The attacker does not need to bypass authentication but relies on the victim’s authenticated session to inject the payload.

Generated by OpenCVE AI on April 30, 2026 at 23:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Language Field plugin to the latest version (greater than 0.9) once it is released; this version is expected to contain a fixed CSRF check.
  • If an upgrade is not immediately possible, temporarily deactivate or remove the plugin to eliminate the attack surface until a patch is available.
  • While awaiting the official fix, enforce WordPress’s built‑in CSRF protection by ensuring all admin‑area forms include a valid nonce and that the plugin’s handlers properly verify this token before storing any input.

Generated by OpenCVE AI on April 30, 2026 at 23:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-10644 Cross-Site Request Forgery (CSRF) vulnerability in theode Language Field allows Stored XSS. This issue affects Language Field: from n/a through 0.9.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in theode Language Field allows Stored XSS. This issue affects Language Field: from n/a through 0.9. Cross-Site Request Forgery (CSRF) vulnerability in theode Language Field language-field allows Stored XSS.This issue affects Language Field: from n/a through <= 0.9.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 09 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 09 Apr 2025 16:30:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in theode Language Field allows Stored XSS. This issue affects Language Field: from n/a through 0.9.
Title WordPress Language Field plugin <= 0.9 - CSRF to Stored XSS vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:05.602Z

Reserved: 2025-03-28T10:59:17.383Z

Link: CVE-2025-31382

cve-icon Vulnrichment

Updated: 2025-04-09T17:39:42.286Z

cve-icon NVD

Status : Deferred

Published: 2025-04-09T17:15:36.743

Modified: 2026-04-23T15:27:43.530

Link: CVE-2025-31382

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T23:45:03Z

Weaknesses