CVE-2025-13413
Awaiting Analysis Awaiting Analysis - Queue
CSRF Vulnerability in Country Blocker for AdSense Plugin

Publication date: 2026-02-19

Last updated on: 2026-02-19

Assigner: Wordfence

Description
The Country Blocker for AdSense plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing nonce validation on the CBFA_guardar_cbfa() function. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-19
Last Modified
2026-02-19
Generated
2026-05-07
AI Q&A
2026-02-19
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
jesus_rodriguez country_blocker_for_adsense to 1.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "CVE-2025-13413 is a Cross-Site Request Forgery (CSRF) vulnerability in the Country Blocker for AdSense WordPress plugin, versions up to and including 1.0. The issue arises because the plugin's AJAX handler function CBFA_guardar_cbfa() lacks nonce validation, which is a security token used to verify legitimate requests."}, {'type': 'paragraph', 'content': "This vulnerability allows an unauthenticated attacker to trick a site administrator into performing an action, such as clicking a malicious link, which then causes the attacker to update the plugin's settings without authorization."}, {'type': 'paragraph', 'content': 'The plugin handles AJAX requests to save configuration data by accepting POST parameters and sanitizing them with wp_kses_post, but it does not properly validate the request origin, enabling forged requests to succeed.'}] [1]


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': "This vulnerability can impact you by allowing an attacker to modify the plugin's settings without your consent if they can trick you, as a site administrator, into clicking a malicious link."}, {'type': 'paragraph', 'content': "Such unauthorized changes could lead to improper blocking or unblocking of Google AdSense ads from specific countries, potentially affecting your site's ad revenue or user experience."}, {'type': 'paragraph', 'content': 'Additionally, because the plugin stores these settings in the WordPress options table, malicious input could be injected, which might affect site security or behavior.'}, {'type': 'paragraph', 'content': 'The CVSS score of 4.3 (medium severity) reflects that the vulnerability requires user interaction but can be exploited remotely with low complexity.'}] [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability involves the WordPress plugin "Country Blocker for AdSense" versions up to 1.0, specifically the AJAX handler CBFA_guardar_cbfa that lacks nonce validation. Detection can focus on identifying unauthorized or forged POST requests to the AJAX action endpoint.'}, {'type': 'paragraph', 'content': "To detect exploitation attempts on your system or network, monitor HTTP POST requests targeting the WordPress admin AJAX endpoint with the action parameter set to 'CBFA_guardar_cbfa'. Look for unusual or unauthorized requests that attempt to update plugin settings."}, {'type': 'list_item', 'content': "Use web server logs or network monitoring tools to filter requests containing 'action=CBFA_guardar_cbfa'."}, {'type': 'list_item', 'content': "Example command to search Apache logs for such requests: `grep 'action=CBFA_guardar_cbfa' /var/log/apache2/access.log`"}, {'type': 'list_item', 'content': "Use tools like curl to test if the AJAX endpoint is accessible without proper authentication or nonce validation, e.g.: `curl -X POST -d 'action=CBFA_guardar_cbfa&trid=test&toe=test&apikeyfor=test' https://yourwordpresssite.com/wp-admin/admin-ajax.php`"}, {'type': 'paragraph', 'content': "Successful responses returning 'true' may indicate the vulnerability is exploitable."}] [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include disabling or deactivating the vulnerable Country Blocker for AdSense plugin until a patched version is available.

Ensure that only trusted administrators have access to the WordPress admin area to reduce the risk of CSRF attacks.

Implement or enforce nonce validation on AJAX requests to prevent unauthorized or forged requests from updating plugin settings.

Monitor and restrict access to the admin-ajax.php endpoint, possibly by limiting it to authenticated users or trusted IP addresses.

Keep WordPress core, plugins, and themes updated to their latest versions to benefit from security patches.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart