CVE-2025-30565

7.1 HIGH

📋 TL;DR

This CSRF vulnerability in the WordPress banner-manager plugin allows attackers to trick authenticated administrators into executing malicious actions without their consent, leading to stored cross-site scripting (XSS). Attackers can inject malicious scripts that execute in users' browsers when they view affected banners. All WordPress sites using vulnerable versions of the banner-manager plugin are affected.

💻 Affected Systems

Products:
  • WordPress banner-manager plugin
Versions: All versions up to and including 16.04.19
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with banner-manager plugin enabled and an authenticated administrator to be tricked into visiting a malicious page.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could compromise administrator accounts, inject persistent malware into website content, steal session cookies, redirect users to malicious sites, or deface the website.

🟠

Likely Case

Attackers inject malicious JavaScript into banners that steals user session cookies or redirects visitors to phishing/malware sites when they view affected banners.

🟢

If Mitigated

With proper CSRF protections and input validation, the attack would fail or be limited to non-persistent effects.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to trick an authenticated administrator into clicking a malicious link while logged in.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 16.04.19

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/banner-manager/vulnerability/wordpress-banner-manager-plugin-16-04-19-csrf-to-stored-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'banner-manager' and click 'Update Now' if available. 4. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Implement CSRF tokens

all

Add CSRF protection to banner management forms

Requires custom code modification - consult developer

Disable plugin

WordPress CLI

Temporarily disable banner-manager plugin until patched

wp plugin deactivate banner-manager

🧯 If You Can't Patch

  • Restrict administrator access to trusted networks only
  • Implement Content Security Policy (CSP) headers to limit script execution

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > banner-manager version. If version is 16.04.19 or earlier, you are vulnerable.

Check Version:

wp plugin get banner-manager --field=version

Verify Fix Applied:

Verify banner-manager plugin version is higher than 16.04.19 in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual banner creation/modification by administrators
  • Suspicious referrer headers in admin requests

Network Indicators:

  • Unexpected POST requests to /wp-admin/admin-ajax.php with banner-related actions

SIEM Query:

source="wordpress.log" AND ("banner-manager" OR "admin-ajax.php") AND (POST OR "action=save_banner")

🔗 References

📤 Share & Export