CVE-2025-23533

7.1 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in the Adrian Moreno WP Lyrics WordPress plugin allows attackers to perform stored cross-site scripting (XSS) attacks. This affects WordPress administrators who can be tricked into executing malicious actions, potentially compromising their sites. All users of WP Lyrics versions up to and including 0.4.1 are vulnerable.

💻 Affected Systems

Products:
  • Adrian Moreno WP Lyrics WordPress Plugin
Versions: n/a through 0.4.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with WP Lyrics plugin enabled. Attack requires administrator interaction.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject malicious JavaScript that steals administrator credentials, defaces websites, or installs backdoors, leading to complete site takeover.

🟠

Likely Case

Attackers create fake admin pages that trick logged-in administrators into executing actions that inject malicious scripts into the site, affecting visitors.

🟢

If Mitigated

With proper CSRF tokens and input validation, the attack chain would be broken, preventing both CSRF and stored XSS.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires tricking an authenticated administrator into clicking a malicious link or visiting a crafted page.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 0.4.1

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/wplyrics/vulnerability/wordpress-wp-lyrics-plugin-0-4-1-csrf-to-stored-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'WP Lyrics' and update to the latest version. 4. If no update is available, deactivate and remove the plugin immediately.

🔧 Temporary Workarounds

Implement CSRF Protection

all

Add CSRF tokens to all plugin forms and validate them on submission.

Input Sanitization

all

Sanitize all user inputs and escape outputs in the plugin code.

🧯 If You Can't Patch

  • Deactivate and remove the WP Lyrics plugin from your WordPress installation.
  • Implement a web application firewall (WAF) with CSRF and XSS protection rules.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for WP Lyrics version. If version is 0.4.1 or earlier, you are vulnerable.

Check Version:

wp plugin list --name=wplyrics --field=version

Verify Fix Applied:

After updating, verify the plugin version is higher than 0.4.1 in the WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to WP Lyrics admin endpoints without referrer headers
  • JavaScript injection patterns in plugin-related database entries

Network Indicators:

  • HTTP requests to wp-admin/admin-ajax.php or similar endpoints with suspicious parameters related to lyrics

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" OR uri_path CONTAINS "wplyrics") AND (http_method="POST" AND NOT referrer CONTAINS own_domain)

🔗 References

📤 Share & Export