Description
The My WP Translate plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the ajax_import_strings() function in all versions up to, and including, 1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
Published: 2025-09-11
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation via Unauthorized Option Changes
Action: Apply Patch
AI Analysis

Impact

The My WP Translate plugin contains a missing capability check in its ajax_import_strings routine, allowing any authenticated user with Subscriber level or higher to update arbitrary WordPress options. An attacker could modify the default registration role to administrator and enable user registration, creating new administrator accounts from the front‑end. The flaw is a classic authorization bypass (CWE‑862) and can elevate an attacker’s privileges from a low‑tier user to a site admin.

Affected Systems

The vulnerability affects the My WP Translate plugin (MyThemesShop) in all releases up to and including version 1.1, which runs on WordPress installations. Any WordPress site using this plugin is at risk unless the plugin is updated or removed.

Risk and Exploitability

The CVSS score of 8.8 classifies the issue as a high‑severity vulnerability. However, the EPSS score of less than 1% indicates that exploitation is currently considered unlikely. The attack requires that the attacker is already authenticated, so the risk is primarily to sites with permissive subscriber access. The flaw is not listed in the CISA KEV catalog, suggesting no widespread exploitation has been documented. Overall, the threat remains significant for sites that allow subscriber access and use the vulnerable plugin version.

Generated by OpenCVE AI on April 20, 2026 at 21:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest patch for My WP Translate that adds the missing capability check.
  • If a patch is not yet available, uninstall My WP Translate to eliminate the risk.
  • Restrict Subscriber or higher user roles to trusted accounts only, or disable user registration entirely if not needed.

Generated by OpenCVE AI on April 20, 2026 at 21:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-27638 The My WP Translate plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the ajax_import_strings() function in all versions up to, and including, 1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
History

Fri, 12 Sep 2025 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Mythemeshop
Mythemeshop my Wp Translate
Wordpress
Wordpress wordpress
Vendors & Products Mythemeshop
Mythemeshop my Wp Translate
Wordpress
Wordpress wordpress

Thu, 11 Sep 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 11 Sep 2025 07:30:00 +0000

Type Values Removed Values Added
Description The My WP Translate plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the ajax_import_strings() function in all versions up to, and including, 1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
Title My WP Translate <= 1.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Options Update
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Mythemeshop My Wp Translate
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:31:55.879Z

Reserved: 2025-07-31T15:37:43.399Z

Link: CVE-2025-8425

cve-icon Vulnrichment

Updated: 2025-09-11T13:32:44.257Z

cve-icon NVD

Status : Deferred

Published: 2025-09-11T08:15:34.267

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-8425

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T22:00:11Z

Weaknesses