Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-6245 | The WPGet API – Connect to any external REST API plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.2.10. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application which can be used to query and modify information from internal services. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 07 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 07 Mar 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WPGet API – Connect to any external REST API plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.2.10. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application which can be used to query and modify information from internal services. | |
| Title | WPGet API <= 2.2.10 - Authenticated (Administrator+) Server-Side Request Forgery | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-03-07T13:36:06.585Z
Reserved: 2025-02-10T22:55:29.229Z
Link: CVE-2024-13857
Updated: 2025-03-07T13:35:58.256Z
Status : Received
Published: 2025-03-07T10:15:16.293
Modified: 2025-03-07T10:15:16.293
Link: CVE-2024-13857
No data.
OpenCVE Enrichment
Updated: 2025-07-12T16:01:40Z
EUVD