CVE-2025-67625

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in the Trade Runner WordPress plugin allows attackers to trick authenticated administrators into performing unintended actions by visiting malicious web pages. It affects all versions up to and including 3.14, potentially compromising site configuration and user data.

💻 Affected Systems

Products:
  • Trade Runner WordPress Plugin
Versions: All versions up to and including 3.14
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Trade Runner plugin enabled and an authenticated admin session.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could change plugin settings, inject malicious code, or modify trading parameters leading to financial loss or complete site takeover.

🟠

Likely Case

Attackers modify plugin configurations, inject ads or redirects, or alter trading rules without admin consent.

🟢

If Mitigated

With proper CSRF tokens and same-origin policies, exploitation attempts would fail, maintaining normal plugin functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks are well-understood and easy to implement; exploitation requires tricking an authenticated admin to visit a malicious page.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 3.14 (check vendor for exact version)

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/traderunner/vulnerability/wordpress-trade-runner-plugin-3-14-cross-site-request-forgery-csrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins > Installed Plugins
3. Find Trade Runner plugin
4. Click 'Update Now' if update available
5. If no update, disable plugin until patch is released

🔧 Temporary Workarounds

Implement CSRF Protection Manually

all

Add CSRF tokens to plugin forms and validate them server-side

Edit plugin PHP files to include nonce tokens in forms: wp_nonce_field('action_name');
Add validation: wp_verify_nonce($_POST['_wpnonce'], 'action_name');

Use Security Plugins

all

Install WordPress security plugins that add CSRF protection

Install and configure Wordfence, Sucuri, or iThemes Security

🧯 If You Can't Patch

  • Disable the Trade Runner plugin immediately
  • Implement strict access controls and monitor admin sessions for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Trade Runner version. If version is 3.14 or lower, you are vulnerable.

Check Version:

wp plugin list --name=traderunner --field=version (if WP-CLI installed) or check WordPress admin plugins page

Verify Fix Applied:

After update, verify version is above 3.14 and test form submissions with invalid CSRF tokens to ensure they are rejected.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed form submissions from same IP
  • Admin actions without proper referrer headers
  • Unexpected plugin configuration changes

Network Indicators:

  • HTTP requests to admin-ajax.php or admin-post.php without proper nonce parameters
  • Cross-origin requests to plugin endpoints

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" OR uri_path="/wp-admin/admin-post.php") AND (NOT form_data.nonce=*)

🔗 References

📤 Share & Export