Description
Cross-Site Request Forgery (CSRF) vulnerability in Tony Zeoli Radio Station radio-station allows Cross Site Request Forgery.This issue affects Radio Station: from n/a through <= 2.5.12.
Published: 2025-07-04
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Radio Station plugin for WordPress, versions up to 2.5.12, contains a Cross‑Site Request Forgery (CWE‑352) flaw that permits an attacker to forge requests against the plugin’s endpoints. When a user visits a malicious web page that triggers such a request, configuration or content changes could be performed without the user’s consent. The CVE description does not detail whether the vulnerability requires the victim to be logged in, so it is inferred that a logged‑in user or a user who can be induced to visit the crafted link would be necessary to execute the attack; this inference is not stated explicitly in the CVE text.

Affected Systems

Any WordPress installation that has the Tony Zeoli Radio Station plugin installed with a version identifier of 2.5.12 or earlier is vulnerable. The affected product list provided by the CNA includes only the plugin itself; no other vendors or products are mentioned.

Risk and Exploitability

The CVSS base score of 4.3 classifies the flaw as moderate risk, while the EPSS score of less than 1% suggests that active exploitation is unlikely at present. Because the module exposes a CSRF endpoint, the likely attack vector is client‑side, relying on a user to follow a malicious link, but the CVE documentation does not confirm this explicitly. The vulnerability is currently not indexed in the CISA KEV catalog, and no official patch has been released; therefore the recommended approach is to eliminate the vulnerable code path until a newer plugin release becomes available.

Generated by OpenCVE AI on April 30, 2026 at 17:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Radio Station plugin to a version newer than 2.5.12 once the official fix is released.
  • If an update is unavailable, disable or uninstall the Radio Station plugin to remove the attack surface.
  • Monitor the plugin’s update channel and maintain all other WordPress components at the latest stable releases to reduce overall attack risk.

Generated by OpenCVE AI on April 30, 2026 at 17:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-19961 Cross-Site Request Forgery (CSRF) vulnerability in Tony Zeoli Radio Station allows Cross Site Request Forgery. This issue affects Radio Station: from n/a through 2.5.12.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Tony Zeoli Radio Station allows Cross Site Request Forgery. This issue affects Radio Station: from n/a through 2.5.12. Cross-Site Request Forgery (CSRF) vulnerability in Tony Zeoli Radio Station radio-station allows Cross Site Request Forgery.This issue affects Radio Station: from n/a through <= 2.5.12.
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Tue, 08 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 04 Jul 2025 09:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Tony Zeoli Radio Station allows Cross Site Request Forgery. This issue affects Radio Station: from n/a through 2.5.12.
Title WordPress Radio Station plugin <= 2.5.12 - Cross Site Request Forgery (CSRF) Vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:26.482Z

Reserved: 2025-07-03T14:50:56.330Z

Link: CVE-2025-53568

cve-icon Vulnrichment

Updated: 2025-07-08T14:18:44.872Z

cve-icon NVD

Status : Deferred

Published: 2025-07-04T09:15:36.370

Modified: 2026-04-23T15:32:36.530

Link: CVE-2025-53568

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T17:15:42Z

Weaknesses