Impact
The vulnerability is a server‑side request forgery (SSRF) that allows an authenticated user with Contributor or higher privileges to trigger outbound HTTP requests from the WordPress site by using the 'embeddoc' shortcode. By supplying a crafted URL, the attacker can have the server query or modify data on arbitrary internal services. The flaw is a classic blind SSRF (CWE-918) and could be leveraged to exfiltrate data or alter configuration on backend services.
Affected Systems
All WordPress installations that have the Embed Any Document – Embed PDF, Word, PowerPoint and Excel Files plugin (developed by awsmin) installed, versions 2.7.5 and below.
Risk and Exploitability
The CVSS score of 6.4 indicates a fairly moderate impact, while the EPSS score of <1% suggests that exploitation is unlikely to be widespread at this time. The vulnerability is not listed in CISA's KEV catalog. Attackers would need to first gain Contributor‑level or higher access to the site and then insert a malicious shortcode to induce outbound requests, potentially exposing or manipulating internal resources.
OpenCVE Enrichment
EUVD