Server-Side Request Forgery in Orbit Fox Plugin for WordPress
CVE-2025-10874

5.5MEDIUM

Key Information:

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-10874?

The Orbit Fox plugin for WordPress, specifically versions prior to 3.0.2, contains a vulnerability that does not impose restrictions on URLs used in its stock photo import feature. This flaw allows authenticated users to specify arbitrary URLs, potentially leading to server-side request forgery (SSRF). By exploiting this vulnerability, an attacker could make the server send unauthorized requests to external resources, which may expose sensitive data or compromise the integrity of the server.

Affected Version(s)

Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More 0 < 3.0.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Ryan Roth
WPScan
.
CVE-2025-10874 : Server-Side Request Forgery in Orbit Fox Plugin for WordPress