CVE-2025-13413
CSRF Vulnerability in Country Blocker for AdSense Plugin
Publication date: 2026-02-19
Last updated on: 2026-02-19
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| jesus_rodriguez | country_blocker_for_adsense | to 1.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': "CVE-2025-13413 is a Cross-Site Request Forgery (CSRF) vulnerability in the Country Blocker for AdSense WordPress plugin, versions up to and including 1.0. The issue arises because the plugin's AJAX handler function CBFA_guardar_cbfa() lacks nonce validation, which is a security token used to verify legitimate requests."}, {'type': 'paragraph', 'content': "This vulnerability allows an unauthenticated attacker to trick a site administrator into performing an action, such as clicking a malicious link, which then causes the attacker to update the plugin's settings without authorization."}, {'type': 'paragraph', 'content': 'The plugin handles AJAX requests to save configuration data by accepting POST parameters and sanitizing them with wp_kses_post, but it does not properly validate the request origin, enabling forged requests to succeed.'}] [1]
How can this vulnerability impact me? :
[{'type': 'paragraph', 'content': "This vulnerability can impact you by allowing an attacker to modify the plugin's settings without your consent if they can trick you, as a site administrator, into clicking a malicious link."}, {'type': 'paragraph', 'content': "Such unauthorized changes could lead to improper blocking or unblocking of Google AdSense ads from specific countries, potentially affecting your site's ad revenue or user experience."}, {'type': 'paragraph', 'content': 'Additionally, because the plugin stores these settings in the WordPress options table, malicious input could be injected, which might affect site security or behavior.'}, {'type': 'paragraph', 'content': 'The CVSS score of 4.3 (medium severity) reflects that the vulnerability requires user interaction but can be exploited remotely with low complexity.'}] [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability involves the WordPress plugin "Country Blocker for AdSense" versions up to 1.0, specifically the AJAX handler CBFA_guardar_cbfa that lacks nonce validation. Detection can focus on identifying unauthorized or forged POST requests to the AJAX action endpoint.'}, {'type': 'paragraph', 'content': "To detect exploitation attempts on your system or network, monitor HTTP POST requests targeting the WordPress admin AJAX endpoint with the action parameter set to 'CBFA_guardar_cbfa'. Look for unusual or unauthorized requests that attempt to update plugin settings."}, {'type': 'list_item', 'content': "Use web server logs or network monitoring tools to filter requests containing 'action=CBFA_guardar_cbfa'."}, {'type': 'list_item', 'content': "Example command to search Apache logs for such requests: `grep 'action=CBFA_guardar_cbfa' /var/log/apache2/access.log`"}, {'type': 'list_item', 'content': "Use tools like curl to test if the AJAX endpoint is accessible without proper authentication or nonce validation, e.g.: `curl -X POST -d 'action=CBFA_guardar_cbfa&trid=test&toe=test&apikeyfor=test' https://yourwordpresssite.com/wp-admin/admin-ajax.php`"}, {'type': 'paragraph', 'content': "Successful responses returning 'true' may indicate the vulnerability is exploitable."}] [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include disabling or deactivating the vulnerable Country Blocker for AdSense plugin until a patched version is available.
Ensure that only trusted administrators have access to the WordPress admin area to reduce the risk of CSRF attacks.
Implement or enforce nonce validation on AJAX requests to prevent unauthorized or forged requests from updating plugin settings.
Monitor and restrict access to the admin-ajax.php endpoint, possibly by limiting it to authenticated users or trusted IP addresses.
Keep WordPress core, plugins, and themes updated to their latest versions to benefit from security patches.