CVE-2025-68584

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in the Vimeotheque WordPress plugin allows attackers to trick authenticated administrators into performing unintended actions on their own WordPress sites. It affects all WordPress sites using Vimeotheque plugin versions up to and including 2.3.5.2.

💻 Affected Systems

Products:
  • Vimeotheque (codeflavors-vimeo-video-post-lite)
Versions: All versions up to and including 2.3.5.2
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the vulnerable plugin installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could trick an administrator into changing plugin settings, modifying content, or potentially performing administrative actions that compromise the WordPress site.

🟠

Likely Case

Attackers could manipulate plugin settings, embed malicious content, or disrupt normal site functionality through forged requests.

🟢

If Mitigated

With proper CSRF protections and user awareness, the risk is significantly reduced as it requires user interaction with malicious content.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the victim to be authenticated as an administrator and to interact with malicious content.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2.3.5.2

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/codeflavors-vimeo-video-post-lite/vulnerability/wordpress-vimeotheque-plugin-2-3-5-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins > Installed Plugins
3. Find Vimeotheque plugin
4. Click 'Update Now' if available
5. Alternatively, download latest version from WordPress repository and manually update

🔧 Temporary Workarounds

Implement CSRF Protection

all

Add CSRF tokens to plugin forms and validate them server-side

Disable Plugin

all

Temporarily disable the Vimeotheque plugin until patched

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block CSRF attempts
  • Educate administrators about phishing risks and safe browsing practices

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Vimeotheque version

Check Version:

wp plugin list --name=vimeotheque --field=version

Verify Fix Applied:

Verify plugin version is greater than 2.3.5.2 in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to Vimeotheque admin endpoints without referrer validation
  • Multiple failed CSRF token validations

Network Indicators:

  • Requests to Vimeotheque admin endpoints from unexpected referrers

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" OR uri_path CONTAINS "vimeotheque") AND http_method="POST" AND referrer NOT CONTAINS own_domain

🔗 References

📤 Share & Export