CVE-2025-64262

6.5 MEDIUM

📋 TL;DR

This CSRF vulnerability in the WordPress Auto Prune Posts plugin allows attackers to trick authenticated administrators into performing unintended actions, such as deleting posts or changing plugin settings. It affects all WordPress sites using Auto Prune Posts version 3.0.0 or earlier. Attackers can exploit this by luring administrators to malicious web pages.

💻 Affected Systems

Products:
  • WordPress Auto Prune Posts plugin
Versions: <= 3.0.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress administrator to be logged in and visit a malicious page while authenticated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete content loss through mass post deletion, plugin misconfiguration leading to site disruption, or privilege escalation if combined with other vulnerabilities.

🟠

Likely Case

Unauthorized deletion of posts or modification of plugin settings, potentially disrupting site content management.

🟢

If Mitigated

No impact if proper CSRF protections are implemented or if administrators avoid clicking suspicious links.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks are well-understood and easy to weaponize. Exploitation requires social engineering to lure administrators.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: > 3.0.0

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/auto-prune-posts/vulnerability/wordpress-auto-prune-posts-plugin-3-0-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Auto Prune Posts and click 'Update Now' if available. 4. If no update is available, deactivate and delete the plugin, then install the latest version from WordPress repository.

🔧 Temporary Workarounds

Implement CSRF tokens manually

all

Add nonce verification to plugin forms and actions

Requires modifying plugin PHP files to include wp_nonce_field() and wp_verify_nonce() calls

Use browser CSRF protection extensions

all

Install browser extensions that detect and block CSRF attempts

🧯 If You Can't Patch

  • Deactivate the Auto Prune Posts plugin immediately
  • Implement strict access controls and educate administrators about CSRF risks

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Auto Prune Posts for version number. If version is 3.0.0 or lower, you are vulnerable.

Check Version:

wp plugin list --name=auto-prune-posts --field=version (if WP-CLI is installed)

Verify Fix Applied:

After updating, verify the plugin version is greater than 3.0.0 in the WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected POST requests to /wp-admin/admin-post.php with auto-prune-posts actions
  • Multiple post deletions from single administrator session

Network Indicators:

  • HTTP requests with Referer headers pointing to external domains making admin requests

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin-post.php" AND query_string="action=auto_prune_posts_*") AND NOT referer_domain="yourdomain.com"

🔗 References

📤 Share & Export