CVE-2023-4025
📋 TL;DR
The Radio Player WordPress plugin has an authorization bypass vulnerability that allows unauthenticated attackers to modify player instances. This affects all WordPress sites running Radio Player version 2.0.73 or earlier. Attackers can exploit this without any authentication or special privileges.
💻 Affected Systems
- Radio Player WordPress Plugin
📦 What is this software?
Radio Player by Softlabbd
⚠️ Risk & Real-World Impact
Worst Case
Attackers could modify all player configurations, inject malicious content into players, or potentially chain with other vulnerabilities for further compromise.
Likely Case
Attackers will modify player settings to display malicious content, redirect users, or disrupt functionality.
If Mitigated
With proper network segmentation and WAF rules, impact is limited to plugin functionality disruption.
🎯 Exploit Status
The vulnerability is simple to exploit via crafted HTTP requests to the vulnerable AJAX endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.0.74 and later
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3048105
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Go to Plugins → Installed Plugins
3. Find Radio Player plugin
4. Click 'Update Now' if available
5. If not, download version 2.0.74+ from WordPress.org
6. Deactivate old version
7. Upload and activate new version
🔧 Temporary Workarounds
Disable vulnerable AJAX endpoint
allBlock access to the vulnerable update_player function via .htaccess or web server configuration
# Add to .htaccess:
<Files "admin-ajax.php">
<IfModule mod_rewrite.c>
RewriteEngine On
RewriteCond %{QUERY_STRING} action=radio_player_update_player
RewriteRule .* - [F,L]
</IfModule>
</Files>
Disable plugin
linuxTemporarily disable the Radio Player plugin until patched
wp plugin deactivate radio-player
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block requests containing 'radio_player_update_player' action parameter
- Restrict access to WordPress admin-ajax.php endpoint to authenticated users only
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Radio Player version. If version is 2.0.73 or lower, you are vulnerable.
Check Version:
wp plugin get radio-player --field=version
Verify Fix Applied:
After updating, verify Radio Player version shows 2.0.74 or higher in WordPress admin plugins page.
📡 Detection & Monitoring
Log Indicators:
- POST requests to /wp-admin/admin-ajax.php with 'action=radio_player_update_player' parameter from unauthenticated users
- Unusual modifications to radio player settings in database
Network Indicators:
- HTTP POST requests to admin-ajax.php with radio_player_update_player action from unexpected IPs
SIEM Query:
source="web_server" AND uri_path="/wp-admin/admin-ajax.php" AND http_method="POST" AND query_string="*action=radio_player_update_player*"
🔗 References
- https://plugins.svn.wordpress.org/radio-player/tags/2.0.7/readme.txt
- https://plugins.trac.wordpress.org/changeset/2942906/radio-player/trunk/includes/class-ajax.php
- https://plugins.trac.wordpress.org/changeset/3048105
- https://www.wordfence.com/threat-intel/vulnerabilities/id/77409977-6822-4d14-9842-cb6a5aff2162?source=cve