CVE-2025-60156

AR · AR For WordPress

A critical Cross-Site Request Forgery (CSRF) vulnerability has been identified in the AR For WordPress plugin.

Executive summary

A critical Cross-Site Request Forgery (CSRF) vulnerability has been identified in the AR For WordPress plugin. This flaw allows an unauthenticated attacker to trick an administrator into unknowingly uploading a malicious file, known as a web shell, which can lead to a complete compromise of the web server, data theft, and further network intrusion.

Vulnerability

The vulnerability exists because the AR For WordPress plugin fails to implement adequate CSRF protection on its file upload functionality. An attacker can craft a malicious webpage or link that, when visited by an authenticated administrator, forces the administrator's browser to send a hidden request to the vulnerable WordPress site. Because the request is sent from the administrator's authenticated session, the plugin accepts the request and uploads a file provided by the attacker, typically a web shell. This allows the attacker to gain Remote Code Execution (RCE) capabilities on the server, granting them full control over the website and its underlying system.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.6. Successful exploitation would grant an attacker complete control over the affected web server. This could lead to severe business consequences, including the theft of sensitive company and customer data, website defacement, service disruption, and significant reputational damage. The compromised server could also be used as a pivot point to launch further attacks against the internal network or be leveraged in wider malicious campaigns, such as hosting malware or participating in botnets, creating legal and financial liabilities for the organization.

Remediation

Immediate Action: Immediately update the "AR For WordPress" plugin to the latest version available from the vendor (a version higher than 7.98). After patching, thoroughly review web server logs for any signs of compromise, such as unexpected file uploads or suspicious POST requests to plugin endpoints.

Proactive Monitoring: Implement continuous monitoring of web server access and error logs, specifically looking for unusual file upload requests (e.g., .php, .jsp, .aspx files) directed at the plugin's directories. Utilize a File Integrity Monitoring (FIM) solution to alert on the creation of any unauthorized files within the web root. Monitor for unusual outbound network traffic from the web server, which could indicate a web shell communicating with an attacker's command-and-control server.

Compensating Controls: If immediate patching is not feasible, consider the following controls:

  • Disable the "AR For WordPress" plugin until it can be safely updated.
  • Implement a Web Application Firewall (WAF) with rules designed to detect and block CSRF attacks and malicious file uploads.
  • Restrict administrative access to the WordPress dashboard to trusted IP addresses only.
  • Enforce the principle of least privilege by ensuring the web server process has minimal write permissions on the file system.

Exploitation status

Public Exploit Available: false

Analyst recommendation

This is a critical vulnerability that enables a full server compromise. Organizations using the "AR For WordPress" plugin on versions 7.98 and below must treat this as a high-priority incident. We strongly recommend applying the vendor-supplied patch immediately to all affected systems. Although this vulnerability is not currently listed on the CISA KEV catalog, its severity warrants urgent action. If patching is delayed, immediately implement the compensating controls listed above, starting with disabling the plugin, to reduce the risk of exploitation.