CVE-2025-24712

5.4 MEDIUM

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in RadiusTheme's Radius Blocks WordPress plugin allows attackers to trick authenticated administrators into performing unintended actions. This affects WordPress sites using Radius Blocks plugin versions up to 2.1.2. Attackers could modify plugin settings or perform other administrative actions without the victim's knowledge.

💻 Affected Systems

Products:
  • RadiusTheme Radius Blocks WordPress Plugin
Versions: n/a through 2.1.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the Radius Blocks plugin installed and activated. Requires an authenticated administrator to be tricked into visiting a malicious page.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could completely compromise the WordPress site by tricking an administrator into changing critical settings, installing malicious plugins, or modifying user permissions.

🟠

Likely Case

Attackers modify plugin settings, change site configurations, or inject malicious content through administrator actions performed without consent.

🟢

If Mitigated

With proper CSRF protections and user awareness, the risk is limited to unsuccessful exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks are well-understood and easy to weaponize. Exploitation requires social engineering to trick authenticated users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.3 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/radius-blocks/vulnerability/wordpress-radius-blocks-wordpress-gutenberg-blocks-plugin-2-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'Radius Blocks' plugin
4. Click 'Update Now' if available
5. If no update appears, download version 2.1.3+ from WordPress.org
6. Deactivate old plugin, upload new version, activate

🔧 Temporary Workarounds

CSRF Protection Headers

all

Implement Content Security Policy (CSP) headers to restrict cross-origin requests

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval';"
Add to nginx config: add_header Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval';";

Disable Plugin

all

Temporarily disable the Radius Blocks plugin until patched

wp plugin deactivate radius-blocks

🧯 If You Can't Patch

  • Implement strict SameSite cookie policies for WordPress authentication cookies
  • Use browser extensions that block CSRF attempts and educate administrators about phishing risks

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Radius Blocks → Version number. If version is 2.1.2 or earlier, you are vulnerable.

Check Version:

wp plugin get radius-blocks --field=version

Verify Fix Applied:

Verify plugin version is 2.1.3 or later in WordPress admin panel. Test CSRF protection by attempting to submit forms without proper tokens.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed CSRF token validations in WordPress logs
  • Unexpected plugin setting changes by authenticated users
  • Administrative actions from unusual IP addresses or user agents

Network Indicators:

  • POST requests to WordPress admin endpoints without Referer headers or CSRF tokens
  • Cross-origin requests to wp-admin URLs

SIEM Query:

source="wordpress.log" AND ("CSRF token" OR "nonce verification failed")

🔗 References

📤 Share & Export