The WP RSS Aggregator plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 4.23.5 via the RSS feed source in admin settings. This makes it possible for authenticated attackers, with administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-16421 | The WP RSS Aggregator plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 4.23.5 via the RSS feed source in admin settings. This makes it possible for authenticated attackers, with administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 07 Nov 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-11-07T20:23:55.846Z
Reserved: 2024-01-16T21:05:34.487Z
Link: CVE-2024-0628
Updated: 2024-08-01T18:11:35.667Z
Status : Modified
Published: 2024-02-07T07:15:07.577
Modified: 2024-11-21T08:47:02.070
Link: CVE-2024-0628
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD