CVE-2025-0801

4.3 MEDIUM

📋 TL;DR

This CSRF vulnerability in the RateMyAgent Official WordPress plugin allows unauthenticated attackers to change the plugin's API key by tricking administrators into clicking malicious links. All WordPress sites using plugin versions up to 1.4.0 are affected. Attackers could potentially disrupt plugin functionality or redirect API calls.

💻 Affected Systems

Products:
  • RateMyAgent Official WordPress Plugin
Versions: All versions up to and including 1.4.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the RateMyAgent Official plugin installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could replace the legitimate API key with their own, potentially intercepting or manipulating data sent to/from the RateMyAgent service, or disabling plugin functionality entirely.

🟠

Likely Case

Attackers change the API key, causing the plugin to stop working properly until an administrator notices and corrects the configuration.

🟢

If Mitigated

With proper CSRF protections and user awareness training, administrators would not click malicious links, preventing exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires social engineering to trick an administrator into clicking a malicious link while authenticated to WordPress.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.4.0

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3244718%40ratemyagent-official&new=3244718%40ratemyagent-official&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'RateMyAgent Official' and click 'Update Now' if available. 4. Alternatively, download latest version from WordPress.org and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Deactivate the plugin until it can be updated to a patched version.

🧯 If You Can't Patch

  • Implement strict access controls to limit who can access WordPress admin panel.
  • Use browser extensions that block CSRF attempts or provide additional CSRF protection at the web server level.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins. If RateMyAgent Official version is 1.4.0 or lower, you are vulnerable.

Check Version:

No direct command; check via WordPress admin interface or examine wp-content/plugins/ratemyagent-official/readme.txt file.

Verify Fix Applied:

After updating, verify the plugin version is higher than 1.4.0 in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected changes to plugin settings, particularly API key modifications without corresponding admin activity.
  • POST requests to /wp-admin/admin.php?page=rma-settings-wizard without proper nonce validation.

Network Indicators:

  • Unusual outbound connections to RateMyAgent API endpoints from unexpected sources if API key was changed.

SIEM Query:

Search for POST requests containing 'rma-settings-wizard' in WordPress access logs without valid nonce parameters.

🔗 References

📤 Share & Export