Description
Cross-Site Request Forgery (CSRF) vulnerability in RadiusTheme Radius Blocks radius-blocks allows Cross Site Request Forgery.This issue affects Radius Blocks: from n/a through <= 2.1.2.
Published: 2025-01-24
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability is a Cross‑Site Request Forgery (CSRF) flaw found in the RadiusTheme Radius Blocks WordPress plugin, affecting all releases up to and including version 2.1.2. Because the plugin does not verify CSRF tokens, an attacker can trick a logged‑in administrator into submitting legitimate requests that perform unintended actions on the site. This could enable unauthorized configuration changes or content manipulation by leveraging a user’s authenticated session.

Affected Systems

WordPress sites that include the Radius Blocks plugin from the RadiusTheme vendor, version 2.1.2 or earlier.

Risk and Exploitability

The CVSS score of 5.4 indicates moderate severity, while the EPSS score of <1% suggests a low probability of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. Attackers would need to target an authenticated session via the WordPress admin interface; the CSRF flaw allows execution of state‑changing requests without further authentication, making exploitation relatively straightforward once the target is identified.

Generated by OpenCVE AI on May 1, 2026 at 18:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the RadiusBlocks plugin to a version newer than 2.1.2.
  • If an upgrade cannot be performed immediately, limit the WordPress admin area to trusted IP addresses or deploy a web application firewall to block unauthorized POST requests that could be used for CSRF.
  • Add or enable CSRF token verification for all state‑changing requests in the plugin, either by modifying the plugin to use WordPress nonces or by employing a security plugin that enforces nonce checks.

Generated by OpenCVE AI on May 1, 2026 at 18:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-3904 Cross-Site Request Forgery (CSRF) vulnerability in RadiusTheme Radius Blocks allows Cross Site Request Forgery. This issue affects Radius Blocks: from n/a through 2.1.2.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in RadiusTheme Radius Blocks allows Cross Site Request Forgery. This issue affects Radius Blocks: from n/a through 2.1.2. Cross-Site Request Forgery (CSRF) vulnerability in RadiusTheme Radius Blocks radius-blocks allows Cross Site Request Forgery.This issue affects Radius Blocks: from n/a through <= 2.1.2.
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}


Fri, 24 Jan 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 24 Jan 2025 17:30:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in RadiusTheme Radius Blocks allows Cross Site Request Forgery. This issue affects Radius Blocks: from n/a through 2.1.2.
Title WordPress Radius Blocks – WordPress Gutenberg Blocks Plugin <= 2.1.2 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:32.790Z

Reserved: 2025-01-23T14:52:31.177Z

Link: CVE-2025-24712

cve-icon Vulnrichment

Updated: 2025-01-24T18:40:05.146Z

cve-icon NVD

Status : Deferred

Published: 2025-01-24T18:15:44.480

Modified: 2026-04-23T15:25:20.813

Link: CVE-2025-24712

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T18:45:15Z

Weaknesses