CVE-2025-64282

2025-12-18 [email protected]

Lifecycle Timeline

2
Analysis Generated
Apr 01, 2026 - 17:44 vuln.today
CVE Published
Dec 18, 2025 - 17:15 nvd
N/A

Description

Authorization Bypass Through User-Controlled Key vulnerability in RadiusTheme Radius Blocks radius-blocks allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Radius Blocks: from n/a through <= 2.2.1.

Analysis

Authorization bypass in RadiusTheme Radius Blocks WordPress plugin through version 2.2.1 allows attackers to exploit incorrectly configured access control security levels via user-controlled keys, enabling unauthorized access to restricted functionality. The vulnerability is classified as an insecure direct object reference (IDOR) issue affecting the plugin's access control implementation. While no CVSS score is available and EPSS indicates low exploitation probability (0.04%), the vulnerability demonstrates a fundamental authentication design flaw that could permit escalation of privileges within WordPress installations using this plugin.

Technical Context

RadiusTheme Radius Blocks is a WordPress plugin that implements block-based content and access control mechanisms. The vulnerability stems from CWE-639 (Authorization Bypass Through User-Controlled Key), a class of flaw where authorization decisions are made based on user-controllable parameters rather than server-side privilege verification. In this case, the plugin's access control logic fails to properly validate user permissions when processing requests, instead relying on client-side or user-supplied identifiers to determine authorization. This pattern is commonly seen in WordPress plugin implementations that inadequately sanitize or validate the source of access control decisions, allowing an authenticated or potentially unauthenticated attacker to manipulate request parameters and bypass intended access restrictions.

Affected Products

RadiusTheme Radius Blocks WordPress plugin is affected in all versions from the initial release through version 2.2.1 (CPE and exact version range noted as n/a through 2.2.1). The plugin functions as a WordPress plugin module providing block-based content management and access control features. Affected installations include any WordPress site running Radius Blocks version 2.2.1 or earlier. Patch information and additional technical details are available through the Patchstack vulnerability database entry at https://patchstack.com/database/Wordpress/Plugin/radius-blocks/vulnerability/wordpress-radius-blocks-plugin-2-2-1-insecure-direct-object-references-idor-vulnerability?_s_id=cve.

Remediation

WordPress administrators using RadiusTheme Radius Blocks should immediately update the plugin to a version released after 2.2.1 that addresses the authorization bypass flaw. The specific patched version number is not provided in available data; consult the official RadiusTheme plugin repository on WordPress.org or the Patchstack advisory for confirmation of the current patched release. In environments where immediate patching is not feasible, administrators should review access control settings within the Radius Blocks plugin configuration and verify that sensitive content blocks are protected by WordPress role-based access controls (e.g., capability checks via user roles) rather than relying solely on the plugin's internal authorization logic. Additional mitigation includes restricting direct access to plugin endpoints via .htaccess or web application firewall rules until patches are applied. Consult https://patchstack.com/database/Wordpress/Plugin/radius-blocks for the latest patch availability and release notes.

Priority Score

0
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +0
POC: 0

Share

CVE-2025-64282 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy