CVE-2025-25146

4.3 MEDIUM

📋 TL;DR

This CSRF vulnerability in the Songkick Concerts and Festivals WordPress plugin allows attackers to trick authenticated administrators into performing unintended actions. It affects all WordPress sites using this plugin from any version through 0.9.7. The vulnerability enables attackers to modify plugin settings or perform other administrative actions without the victim's knowledge.

💻 Affected Systems

Products:
  • WordPress Songkick Concerts and Festivals Plugin
Versions: n/a through 0.9.7
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the vulnerable plugin enabled. Requires authenticated admin sessions to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could reconfigure the plugin to display malicious content, redirect users to phishing sites, or modify site functionality to compromise user data.

🟠

Likely Case

Attackers trick administrators into changing plugin settings, potentially disrupting concert/festival display functionality or injecting unwanted content.

🟢

If Mitigated

With proper CSRF protections and user awareness, the risk is minimal as it requires authenticated admin sessions and social engineering.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks typically require social engineering to trick authenticated users. No public exploit code identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.9.8 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/songkick-concerts-and-festivals/vulnerability/wordpress-songkick-concerts-and-festivals-plugin-0-9-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Songkick Concerts and Festivals'. 4. Click 'Update Now' if available. 5. Alternatively, download version 0.9.8+ from WordPress repository and replace files.

🔧 Temporary Workarounds

Implement CSRF Protection Headers

all

Add security headers to WordPress to help prevent CSRF attacks

Add to .htaccess: Header set X-Frame-Options "SAMEORIGIN"
Add to .htaccess: Header set Content-Security-Policy "frame-ancestors 'self'"

Disable Plugin

linux

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate songkick-concerts-and-festivals

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect CSRF patterns
  • Educate administrators about CSRF risks and safe browsing practices

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Songkick Concerts and Festivals → Version. If version is 0.9.7 or earlier, you're vulnerable.

Check Version:

wp plugin get songkick-concerts-and-festivals --field=version

Verify Fix Applied:

Verify plugin version is 0.9.8 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to plugin admin endpoints from unexpected referrers
  • Unusual plugin configuration changes in WordPress logs

Network Indicators:

  • CSRF token validation failures
  • Cross-origin requests to plugin admin endpoints

SIEM Query:

source="wordpress.log" AND "songkick" AND ("POST" OR "admin-ajax") AND referrer NOT CONTAINS "your-domain.com"

🔗 References

📤 Share & Export