Server-Side Request Forgery in Popup Builder for WordPress
CVE-2025-10861
Key Information:
- Vendor
WordPress
- Status
- Vendor
- CVE Published:
- 24 October 2025
What is CVE-2025-10861?
The Popup Builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers plugin for WordPress is exploitable through Server-Side Request Forgery due to insufficient URL validation. This allows unauthenticated attackers to issue web requests to unauthorized locations, potentially allowing information retrieval and modification from internal services, as well as the ability to conduct network reconnaissance activities. While a partial patch was introduced in version 2.1.4, users of the affected versions should remain vigilant and apply all recommended security measures.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers * <= 2.1.4
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved