Description
The Task Scheduler plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.6.3 via the “Check Website” task. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Published: 2025-10-15
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery (Blind SSRF)
Action: Update plugin
AI Analysis

Impact

The Task Scheduler WordPress plugin contains a blind server‑side request forgery flaw that can be triggered via the “Check Website” task. When a user with Administrator privileges or higher invokes this task, the plugin sends HTTP requests to an arbitrary host originating from the web server. The attacker can query or modify information on internal services reachable from the server, effectively turning the web application into an internal network probe.

Affected Systems

The affected software is the Task Scheduler plugin developed by miunosoft for WordPress. Versions up to and including 1.6.3 are vulnerable. The issue arises from all releases prior to the 1.6.4 update, where the logic for the “Check Website” task was not secured against arbitrary URLs.

Risk and Exploitability

The CVSS score of 4.4 indicates moderate severity, while the EPSS score of less than 1% suggests a very low probability of exploitation, and the vulnerability is not listed in CISA’s KEV catalog. Because the flaw requires Administrator‑level access, it cannot be leveraged by unauthenticated or low‑privilege users. The primary attack vector is an internal network request from the WordPress server, allowing reconnaissance or manipulation of internal services that are reachable from the server. Overall, the threat level is low to moderate, but patching is recommended to close the blind SSRF channel.

Generated by OpenCVE AI on April 21, 2026 at 02:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Task Scheduler plugin to the latest version, removing the vulnerable “Check Website” feature.
  • Restrict the set of administrators who can add or execute the “Check Website” tasks, limiting the attack surface for attackers who already have admin access.
  • Configure the web server or network firewall to block outbound HTTP requests from the WordPress installation to internal or localhost ranges, preventing the plugin from using the SSRF channel.

Generated by OpenCVE AI on April 21, 2026 at 02:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 21 Oct 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Miunosoft
Miunosoft task Scheduler
Wordpress
Wordpress wordpress
Vendors & Products Miunosoft
Miunosoft task Scheduler
Wordpress
Wordpress wordpress

Wed, 15 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Oct 2025 08:45:00 +0000

Type Values Removed Values Added
Description The Task Scheduler plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.6.3 via the “Check Website” task. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Title Task Scheduler <= 1.6.3 - Authenticated (Admin+) Blind Server-Side Request Forgery
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Miunosoft Task Scheduler
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:25:58.619Z

Reserved: 2025-09-05T19:29:56.719Z

Link: CVE-2025-10056

cve-icon Vulnrichment

Updated: 2025-10-15T13:49:09.780Z

cve-icon NVD

Status : Deferred

Published: 2025-10-15T09:15:37.057

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-10056

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T02:30:25Z

Weaknesses