CVE-2025-26963

5.4 MEDIUM

📋 TL;DR

This CSRF vulnerability in the ClickWhale WordPress plugin allows attackers to trick authenticated administrators into performing unauthorized actions, such as changing plugin settings. It affects all ClickWhale installations from unknown versions through 2.4.3. WordPress site administrators using vulnerable versions are at risk.

💻 Affected Systems

Products:
  • ClickWhale WordPress Plugin
Versions: n/a through 2.4.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress administrator access to exploit; affects all default configurations of vulnerable versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify plugin settings to redirect traffic, inject malicious content, or disable security features, potentially leading to site compromise or data leakage.

🟠

Likely Case

Attackers trick administrators into changing plugin configurations, disrupting functionality or enabling further attacks through the compromised plugin.

🟢

If Mitigated

With proper CSRF protections, requests would require valid tokens, preventing unauthorized actions even if administrators visit malicious pages.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated administrator into clicking a malicious link or visiting a compromised page.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.4 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/clickwhale/vulnerability/wordpress-clickwhale-plugin-2-4-3-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find ClickWhale and click 'Update Now'. 4. Verify update to version 2.4.4 or higher.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable ClickWhale plugin until patched to prevent exploitation.

wp plugin deactivate clickwhale

🧯 If You Can't Patch

  • Implement strict access controls limiting administrator privileges to trusted users only.
  • Use browser extensions that block CSRF attempts or enforce same-origin policies.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for ClickWhale version. If version is 2.4.3 or lower, it's vulnerable.

Check Version:

wp plugin get clickwhale --field=version

Verify Fix Applied:

After update, confirm ClickWhale version is 2.4.4 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin.php?page=clickwhale from unexpected referrers
  • Multiple failed CSRF token validations in WordPress logs

Network Indicators:

  • HTTP requests to plugin admin endpoints without proper referrer headers or CSRF tokens

SIEM Query:

source="wordpress.log" AND "admin.php?page=clickwhale" AND (referer NOT CONTAINS "your-domain.com" OR csrf_token INVALID)

🔗 References

📤 Share & Export