SSRF Attack Vulnerability in Popup Builder WordPress Plugin
CVE-2023-6294

7.2HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
12 February 2024

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

Summary

The Popup Builder WordPress plugin prior to version 4.2.6 has a significant security flaw that arises from inadequate validation of parameters during requests. This vulnerability can be exploited by users with administrative privileges within Multisite WordPress environments, potentially allowing for Server-Side Request Forgery (SSRF) attacks. Such attacks can lead to unauthorized access to internal resources or sensitive data on the server, thereby posing a serious risk to the security of the affected WordPress installations.

Affected Version(s)

Popup Builder 0 < 4.2.6

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Sebastian Neef
WPScan
.