Description
The My WP Translate plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the mtswpt_remove_plugin() and ajax_update_export_code() functions in all versions up to, and including, 1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read and delete arbitrary WordPress options which can cause a denial of service.
Published: 2025-09-11
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Data Tampering and Denial of Service
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the My WP Translate plugin for WordPress, where certain functions bypass the required capability check, allowing any user with Subscriber privileges or higher to manipulate site options. By executing the malicious actions, an attacker can read configuration values or delete arbitrary options, potentially rendering the site unstable or unavailable. This flaw aligns with the CWE-862 classification of Missing Authorization.

Affected Systems

The flaw is present in all releases of My WP Translate from the initial version through 1.1, distributed by My Theme Shop. WordPress sites running any of these versions are susceptible. No specific WordPress core or PHP version requirements were noted, so the affected environment is any WordPress installation that hosts the plugin.

Risk and Exploitability

The CVSS score of 5.4 indicates a moderate threat, while the EPSS score of less than 1% signifies that exploitation is unlikely in the wild. The vulnerability is not yet listed in the CISA KEV catalog. Attackers must be authenticated with a Subscriber role or higher, after which they can issue requests to the plugin's admin actions to read or delete options, thereby causing integrity or availability issues.

Generated by OpenCVE AI on April 21, 2026 at 03:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update My WP Translate to the latest version released after 1.1, or uninstall the plugin if no upgrade is available.
  • Temporarily block the affected AJAX calls (mtswpt_remove_plugin and ajax_update_export_code) by adding a custom plugin or code snippet that checks the current user's capabilities before allowing execution; this serves as a workaround until a patch is applied.
  • Review the WordPress options table for entries created by the plugin, back up the database, and remove any redundant or sensitive options that could be targeted.
  • Monitor site logs for unusual option read or delete requests and alert administrators of suspicious activity.

Generated by OpenCVE AI on April 21, 2026 at 03:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-27659 The My WP Translate plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the mtswpt_remove_plugin() and ajax_update_export_code() functions in all versions up to, and including, 1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read and delete arbitrary WordPress options which can cause a denial of service.
History

Fri, 12 Sep 2025 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Mythemeshop
Mythemeshop my Wp Translate
Wordpress
Wordpress wordpress
Vendors & Products Mythemeshop
Mythemeshop my Wp Translate
Wordpress
Wordpress wordpress

Thu, 11 Sep 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 11 Sep 2025 07:30:00 +0000

Type Values Removed Values Added
Description The My WP Translate plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the mtswpt_remove_plugin() and ajax_update_export_code() functions in all versions up to, and including, 1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read and delete arbitrary WordPress options which can cause a denial of service.
Title My WP Translate <= 1.1 - Authenticated (Subscriber+) Missing Authorization to Arbitrary Option Read and Deletion
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}


Subscriptions

Mythemeshop My Wp Translate
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:55:27.773Z

Reserved: 2025-07-31T15:11:46.654Z

Link: CVE-2025-8423

cve-icon Vulnrichment

Updated: 2025-09-11T14:05:07.246Z

cve-icon NVD

Status : Deferred

Published: 2025-09-11T08:15:34.077

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-8423

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T03:15:16Z

Weaknesses