CVE-2025-60156

9.6 CRITICAL

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in the AR For WordPress plugin allows attackers to trick authenticated administrators into unknowingly uploading web shells to the server. This affects all versions up to 7.98 of the AR For WordPress plugin. Attackers can gain complete control of affected WordPress sites through this vulnerability.

💻 Affected Systems

Products:
  • AR For WordPress plugin
Versions: n/a through 7.98
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress administrator to be logged in and visit a malicious page while authenticated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, ransomware deployment, or use as part of a botnet.

🟠

Likely Case

Unauthorized file upload leading to backdoor installation and persistent access to the WordPress site.

🟢

If Mitigated

Attack fails due to CSRF tokens or same-origin policy protections.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick authenticated administrators.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.99 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/ar-for-wordpress/vulnerability/wordpress-ar-for-wordpress-plugin-7-98-cross-site-request-forgery-csrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'AR For WordPress' and click 'Update Now'. 4. Verify version is 7.99 or higher.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched.

wp plugin deactivate ar-for-wordpress

Add CSRF Protection

all

Implement custom CSRF tokens in WordPress forms.

🧯 If You Can't Patch

  • Restrict administrator access to trusted networks only
  • Implement web application firewall with CSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > AR For WordPress version. If version is 7.98 or lower, you are vulnerable.

Check Version:

wp plugin get ar-for-wordpress --field=version

Verify Fix Applied:

Confirm AR For WordPress plugin version is 7.99 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized file uploads to wp-content/uploads/
  • Suspicious POST requests to plugin admin endpoints
  • Unexpected PHP file creation in upload directories

Network Indicators:

  • CSRF attack patterns in web server logs
  • Requests with missing or invalid referer headers to admin endpoints

SIEM Query:

source="web_server" (uri_path="/wp-admin/admin-ajax.php" OR uri_path CONTAINS "ar-for-wordpress") AND (http_method="POST" AND referer NOT CONTAINS "your-domain.com")

🔗 References

📤 Share & Export