Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 21 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Miunosoft
Miunosoft task Scheduler Wordpress Wordpress wordpress |
|
| Vendors & Products |
Miunosoft
Miunosoft task Scheduler Wordpress Wordpress wordpress |
Wed, 15 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 15 Oct 2025 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Task Scheduler plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.6.3 via the “Check Website” task. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. | |
| Title | Task Scheduler <= 1.6.3 - Authenticated (Admin+) Blind Server-Side Request Forgery | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-10-15T13:49:14.458Z
Reserved: 2025-09-05T19:29:56.719Z
Link: CVE-2025-10056
Updated: 2025-10-15T13:49:09.780Z
Status : Awaiting Analysis
Published: 2025-10-15T09:15:37.057
Modified: 2025-10-16T15:28:59.610
Link: CVE-2025-10056
No data.
OpenCVE Enrichment
Updated: 2025-10-21T09:41:09Z