CVE-2025-62739

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in the WordPress Add Custom Codes plugin allows attackers to trick authenticated administrators into performing unintended actions. Attackers can create malicious requests that execute when administrators visit compromised pages, potentially modifying plugin settings or injecting malicious code. All WordPress sites using Add Custom Codes plugin versions up to and including 4.80 are affected.

💻 Affected Systems

Products:
  • WordPress Add Custom Codes plugin
Versions: n/a through <= 4.80
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to trick authenticated administrator into visiting malicious page while logged in.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject malicious JavaScript or HTML into WordPress sites, leading to complete site compromise, data theft, or malware distribution to visitors.

🟠

Likely Case

Attackers modify plugin settings or inject limited malicious code that could redirect users, steal session cookies, or deface the website.

🟢

If Mitigated

With proper CSRF protections and user awareness, exploitation attempts fail, maintaining normal plugin functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks typically require social engineering to trick authenticated users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: >4.80

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/add-custom-codes/vulnerability/wordpress-add-custom-codes-plugin-4-80-cross-site-request-forgery-csrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Add Custom Codes' and check if update is available. 4. Click 'Update Now' or update to version above 4.80. 5. Verify plugin functions correctly after update.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add CSRF protection to plugin forms if custom modifications exist.

Use Security Plugins

all

Install WordPress security plugins that include CSRF protection features.

🧯 If You Can't Patch

  • Disable or remove the Add Custom Codes plugin if not essential
  • Implement strict access controls and educate administrators about CSRF risks

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Add Custom Codes version <= 4.80

Check Version:

wp plugin list --name=add-custom-codes --field=version

Verify Fix Applied:

Confirm plugin version is >4.80 in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unexpected POST requests to plugin admin endpoints
  • Multiple failed authentication attempts followed by successful plugin modifications

Network Indicators:

  • Unusual cross-origin requests to WordPress admin-ajax.php or plugin-specific endpoints

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" OR uri_path CONTAINS "add-custom-codes") AND http_method="POST" AND referer NOT CONTAINS own_domain

🔗 References

📤 Share & Export