CVE-2025-6247

4.7 MEDIUM

📋 TL;DR

This CSRF vulnerability in WordPress Automatic Plugin allows attackers to trick administrators into performing unauthorized actions, potentially injecting malicious scripts into campaigns. All WordPress sites using this plugin up to version 3.118.0 are affected. Attackers can exploit this without authentication by crafting malicious links.

💻 Affected Systems

Products:
  • WordPress Automatic Plugin
Versions: All versions up to and including 3.118.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the Automatic Plugin installed and activated. Requires administrator interaction for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Site compromise through persistent XSS payloads injected into campaigns, leading to credential theft, malware distribution, or complete site takeover.

🟠

Likely Case

Malicious scripts injected into campaigns that could redirect visitors, steal cookies, or display unwanted content.

🟢

If Mitigated

Limited impact if administrators use browser security extensions, avoid clicking suspicious links, and have proper web application firewalls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to trick administrators into clicking malicious links. No authentication needed for the forged request itself.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.118.1 or later

Vendor Advisory: https://codecanyon.net/item/wordpress-automatic-plugin/1904470

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'WordPress Automatic Plugin' and click 'Update Now'. 4. Verify version is 3.118.1 or higher.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patching is possible

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to limit script execution
  • Use browser extensions that block CSRF attempts and educate administrators about phishing risks

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → WordPress Automatic Plugin version number

Check Version:

wp plugin list --name='WordPress Automatic Plugin' --field=version

Verify Fix Applied:

Confirm plugin version is 3.118.1 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with action parameters related to campaign updates
  • Multiple failed nonce validation attempts

Network Indicators:

  • Suspicious referrer headers in admin requests
  • Unexpected campaign update requests from non-admin IPs

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND action="*campaign*")

🔗 References

📤 Share & Export