CVE-2025-32266

4.3 MEDIUM

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in the WordPress plugin '404 Image Redirection (Replace Broken Images)' allows attackers to trick authenticated administrators into performing unintended actions. This affects WordPress sites using vulnerable versions of the plugin, potentially allowing attackers to modify plugin settings or perform other administrative actions.

💻 Affected Systems

Products:
  • WordPress 404 Image Redirection (Replace Broken Images) plugin
Versions: n/a through 1.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations using vulnerable plugin versions are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could trick an authenticated administrator into changing plugin settings, redirecting legitimate images to malicious content, or performing other administrative actions that could compromise site integrity or user security.

🟠

Likely Case

Attackers could modify plugin configuration to redirect broken image requests to malicious URLs, potentially leading to phishing attacks, malware distribution, or SEO manipulation.

🟢

If Mitigated

With proper CSRF protections and user awareness, the risk is significantly reduced as attackers would need to trick authenticated users into clicking malicious links while logged in.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated administrator into clicking a malicious link while logged into WordPress admin panel.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/broken-images-redirection/vulnerability/wordpress-404-image-redirection-replace-broken-images-plugin-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find '404 Image Redirection (Replace Broken Images)'. 4. Click 'Update Now' if available, or download version 1.5+ from WordPress repository. 5. Activate updated plugin.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the plugin until patched version is available

wp plugin deactivate broken-images-redirection

Implement CSRF protection middleware

all

Add WordPress nonce verification to all plugin admin forms

🧯 If You Can't Patch

  • Restrict admin access to trusted networks only
  • Implement strict user session management and logout policies

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for '404 Image Redirection (Replace Broken Images)' version 1.4 or earlier

Check Version:

wp plugin get broken-images-redirection --field=version

Verify Fix Applied:

Verify plugin version is 1.5 or later in WordPress admin plugins page

📡 Detection & Monitoring

Log Indicators:

  • Unusual plugin configuration changes
  • Multiple failed CSRF token validations in WordPress logs

Network Indicators:

  • Unexpected POST requests to wp-admin/admin.php with plugin-related parameters

SIEM Query:

source="wordpress.log" AND ("broken-images-redirection" OR "404-image-redirection") AND ("POST" OR "admin-ajax")

🔗 References

📤 Share & Export