First published: Fri Jan 24 2025(Updated: )
Cross-Site Request Forgery (CSRF) vulnerability in RadiusTheme Radius Blocks allows Cross Site Request Forgery. This issue affects Radius Blocks: from n/a through 2.1.2.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
RadiusTheme Radius Blocks | <=2.1.2 | |
RadiusTheme Radius Blocks | <=2.1.2 |
Update the WordPress Radius Blocks – WordPress Gutenberg Blocks wordpress plugin to the latest available version (at least 2.2.0).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-24712 has been classified as a serious Cross-Site Request Forgery (CSRF) vulnerability.
To fix CVE-2025-24712, you should update RadiusTheme Radius Blocks to a version later than 2.1.2.
CVE-2025-24712 affects users of RadiusTheme Radius Blocks, specifically versions up to and including 2.1.2.
CVE-2025-24712 is a Cross-Site Request Forgery (CSRF) vulnerability.
Yes, CVE-2025-24712 can potentially lead to unauthorized actions being performed on behalf of the user, which may compromise data security.