Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64201: Cross-Site Request Forgery (CSRF) in blubrry PowerPress Podcasting

0
Medium
VulnerabilityCVE-2025-64201cvecve-2025-64201
Published: Wed Oct 29 2025 (10/29/2025, 08:38:06 UTC)
Source: CVE Database V5
Vendor/Project: blubrry
Product: PowerPress Podcasting

Description

Cross-Site Request Forgery (CSRF) vulnerability in blubrry PowerPress Podcasting powerpress allows Cross Site Request Forgery.This issue affects PowerPress Podcasting: from n/a through <= 11.13.12.

AI-Powered Analysis

AILast updated: 11/13/2025, 13:02:28 UTC

Technical Analysis

CVE-2025-64201 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the blubrry PowerPress Podcasting plugin for WordPress, affecting all versions up to and including 11.13.12. CSRF vulnerabilities occur when a web application does not properly verify that requests made to it originate from legitimate users, allowing attackers to trick authenticated users into submitting unwanted actions. In this case, an attacker could craft a malicious web request that, when executed by a logged-in user, causes the PowerPress plugin to perform unauthorized operations such as changing podcast settings or configurations. The vulnerability does not require the attacker to have privileges or authentication; however, the victim must be logged into the affected WordPress site and interact with the malicious content (e.g., visiting a crafted URL). The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N) indicates that the attack can be performed remotely over the network with low attack complexity, no privileges required, but user interaction is necessary. The impact is limited to confidentiality, with no direct effect on integrity or availability. No known exploits are currently reported in the wild, and no patches or mitigation links are provided yet, indicating that the vulnerability is newly disclosed. The plugin is widely used in podcast publishing, making it a relevant target for attackers aiming to disrupt or manipulate podcast content or metadata.

Potential Impact

For European organizations, particularly those involved in media, podcast production, and content publishing using WordPress with the PowerPress plugin, this vulnerability could lead to unauthorized changes in podcast configurations or metadata. Although the confidentiality impact is limited, manipulation of podcast feeds or settings could damage brand reputation, disrupt content delivery, or lead to misinformation. Since the vulnerability requires user interaction and an authenticated session, the risk is somewhat mitigated but remains significant for sites with multiple administrators or editors. Attackers could exploit this to inject malicious redirects, alter feed URLs, or disable podcast distribution, indirectly impacting availability and user trust. The lack of known exploits reduces immediate risk, but the medium severity score and ease of exploitation warrant prompt attention. Organizations failing to address this vulnerability may face targeted attacks aiming to hijack podcast content or disrupt service continuity.

Mitigation Recommendations

European organizations should proactively monitor for official patches or updates from blubrry and apply them immediately upon release. In the interim, administrators should implement anti-CSRF tokens or verify nonce usage in all forms and actions related to the PowerPress plugin. Restrict administrative and editorial access to trusted users only and enforce multi-factor authentication to reduce the risk of session hijacking. Employ web application firewalls (WAF) with rules to detect and block suspicious CSRF attempts targeting the plugin endpoints. Educate users about the risks of clicking on untrusted links while logged into administrative accounts. Regularly audit plugin configurations and logs for unauthorized changes. Consider isolating podcast management to dedicated accounts with minimal privileges and segregate podcast publishing workflows to reduce attack surface. Finally, maintain up-to-date backups of podcast data and configurations to enable rapid recovery if manipulation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-10-29T03:07:04.007Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6901d65c86d093201c2b463c

Added to database: 10/29/2025, 8:54:52 AM

Last enriched: 11/13/2025, 1:02:28 PM

Last updated: 12/14/2025, 12:46:49 PM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats