Description
The RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 5.1.1 via the feedzy_lazy_load function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Published: 2025-12-11
Score: 5.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Blind Server‑Side Request Forgery
Action: Apply Patch
AI Analysis

Impact

The RSS Aggregator by Feedzy plugin contains an unauthenticated blind server‑side request forgery (SSRF) vulnerability in the feedzy_lazy_load function. Attackers can cause the WordPress site to issue HTTP requests to arbitrary internal or external hosts, enabling the retrieval or modification of sensitive data from services that are normally inaccessible from the public internet. This flaw can expose internal network structure, exfiltrate confidential information, or allow malicious modification of internal resources.

Affected Systems

This issue affects the Themeisle WordPress plugin RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator for all releases up to and including version 5.1.1. No other plugin versions are known to be vulnerable, but any installation of the affected versions that is still in use remains at risk.

Risk and Exploitability

With a CVSS score of 5.8 the vulnerability is considered moderate. The EPSS score of less than 1% indicates a low probability of exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. However, because the flaw allows unauthenticated actors to issue arbitrary requests from the host, it can be leveraged to probe internal services, exfiltrate information, or manipulate application data. The likely attack vector is an unauthenticated user sending a crafted request that triggers feedzy_lazy_load, which then forwards the request to a target host chosen by the attacker.

Generated by OpenCVE AI on April 22, 2026 at 12:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the RSS Aggregator by Feedzy plugin to a version that removes the blind SSRF flaw.
  • If an update is not available, disable the plugin or restrict access to the feedzy_lazy_load function.
  • Configure outbound network restrictions or use a web application firewall rule to block arbitrary HTTP requests originating from the plugin.

Generated by OpenCVE AI on April 22, 2026 at 12:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 11 Dec 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Themeisle
Themeisle rss Aggregator By Feedzy
Wordpress
Wordpress wordpress
Vendors & Products Themeisle
Themeisle rss Aggregator By Feedzy
Wordpress
Wordpress wordpress

Thu, 11 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 11 Dec 2025 02:45:00 +0000

Type Values Removed Values Added
Description The RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 5.1.1 via the feedzy_lazy_load function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Title RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator <= 5.1.1 - Unauthenticated Blind Server-Side Request Forgery
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 5.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N'}


Subscriptions

Themeisle Rss Aggregator By Feedzy
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:54:19.734Z

Reserved: 2025-10-07T20:51:21.871Z

Link: CVE-2025-11467

cve-icon Vulnrichment

Updated: 2025-12-11T15:34:26.447Z

cve-icon NVD

Status : Deferred

Published: 2025-12-11T03:15:57.450

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11467

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T12:30:16Z

Weaknesses