CVE-2025-28932

7.1 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in the WordPress Insert Code plugin allows attackers to trick authenticated administrators into executing malicious actions that inject persistent cross-site scripting (XSS) payloads. This affects all WordPress sites using Insert Code plugin versions up to 2.4. The vulnerability enables attackers to compromise website visitors through stored malicious scripts.

💻 Affected Systems

Products:
  • WordPress Insert Code plugin
Versions: n/a through 2.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Insert Code plugin enabled and an authenticated administrator to be tricked into visiting a malicious page.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject persistent malicious JavaScript that steals session cookies, redirects users to phishing sites, or performs actions on behalf of authenticated users, potentially leading to full site compromise.

🟠

Likely Case

Attackers trick administrators into adding malicious scripts to website pages, which then execute in visitors' browsers, potentially stealing credentials or session tokens.

🟢

If Mitigated

With proper CSRF protections and content security policies, the attack surface is reduced, though the vulnerability still exists in the codebase.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to trick an authenticated administrator into clicking a malicious link while logged into WordPress admin.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 2.4

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/insert-code/vulnerability/wordpress-insert-code-plugin-2-4-csrf-to-stored-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Insert Code' plugin. 4. Click 'Update Now' if available. 5. If no update appears, manually download latest version from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Implement CSRF Protection Headers

all

Add Content Security Policy headers to restrict script execution sources

Add to .htaccess: Header set Content-Security-Policy "script-src 'self'"
Add to wp-config.php: define('FORCE_SSL_ADMIN', true);

🧯 If You Can't Patch

  • Disable or remove the Insert Code plugin entirely
  • Implement strict access controls and monitor administrator account activity for suspicious behavior

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Insert Code version 2.4 or earlier

Check Version:

wp plugin list --name=insert-code --field=version

Verify Fix Applied:

Verify Insert Code plugin version is greater than 2.4 in WordPress admin plugins list

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to wp-admin/admin-ajax.php or plugin-specific endpoints
  • Administrator accounts accessing suspicious external URLs

Network Indicators:

  • Unexpected JavaScript injection in page responses
  • Cross-origin requests from admin sessions to unknown domains

SIEM Query:

source="wordpress.log" AND ("insert-code" OR "admin-ajax") AND status=200 AND method=POST

🔗 References

📤 Share & Export