CVE-2025-62739
📋 TL;DR
This CSRF vulnerability in the WordPress Add Custom Codes plugin allows attackers to trick authenticated administrators into performing unintended actions. Attackers can create malicious requests that execute when administrators visit compromised pages, potentially modifying plugin settings or injecting malicious code. All WordPress sites using Add Custom Codes plugin versions up to and including 4.80 are affected.
💻 Affected Systems
- WordPress Add Custom Codes plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could inject malicious JavaScript or HTML into WordPress sites, leading to complete site compromise, data theft, or malware distribution to visitors.
Likely Case
Attackers modify plugin settings or inject limited malicious code that could redirect users, steal session cookies, or deface the website.
If Mitigated
With proper CSRF protections and user awareness, exploitation attempts fail, maintaining normal plugin functionality.
🎯 Exploit Status
CSRF attacks typically require social engineering to trick authenticated users.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: >4.80
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Add Custom Codes' and check if update is available. 4. Click 'Update Now' or update to version above 4.80. 5. Verify plugin functions correctly after update.
🔧 Temporary Workarounds
Implement CSRF Tokens
allAdd CSRF protection to plugin forms if custom modifications exist.
Use Security Plugins
allInstall WordPress security plugins that include CSRF protection features.
🧯 If You Can't Patch
- Disable or remove the Add Custom Codes plugin if not essential
- Implement strict access controls and educate administrators about CSRF risks
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Installed Plugins for Add Custom Codes version <= 4.80
Check Version:
wp plugin list --name=add-custom-codes --field=version
Verify Fix Applied:
Confirm plugin version is >4.80 in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- Unexpected POST requests to plugin admin endpoints
- Multiple failed authentication attempts followed by successful plugin modifications
Network Indicators:
- Unusual cross-origin requests to WordPress admin-ajax.php or plugin-specific endpoints
SIEM Query:
source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" OR uri_path CONTAINS "add-custom-codes") AND http_method="POST" AND referer NOT CONTAINS own_domain