Description
Server-Side Request Forgery (SSRF) vulnerability in QuantumCloud SEO Help seo-help allows Server Side Request Forgery.This issue affects SEO Help: from n/a through <= 6.7.9.
Published: 2025-04-09
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a Server‑Side Request Forgery that allows an attacker to command the vulnerable QuantumCloud SEO Help WordPress plugin to issue HTTP requests to arbitrary URLs. This flaw can lead to the exposure of internal network resources or sensitive data, creating confidentiality and integrity risks and providing a foothold for additional attacks.

Affected Systems

All installations of the QuantumCloud SEO Help WordPress plugin with versions up to and including 6.7.9 are affected. The vulnerability is present on any WordPress site that has the plugin installed and activated.

Risk and Exploitability

The CVSS score of 6.8 indicates moderate severity. The EPSS score of < 1% suggests a low probability of exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is through the plugin’s exposed API or configuration endpoints, which an attacker can target by submitting crafted URL parameters or form inputs. Exploitation conditions appear to require remote access to the website’s visitor‑facing interface, making the vulnerability remotely exploitable under typical WordPress deployment scenarios.

Generated by OpenCVE AI on May 1, 2026 at 00:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the QuantumCloud SEO Help plugin to a version newer than 6.7.9 or to the latest available release.
  • Restrict plugin configuration and API access so that only administrators can submit URLs that the plugin will resolve.
  • Implement input validation and a URL whitelist in the WordPress environment or use a Web Application Firewall to block or filter outbound requests originating from the plugin.

Generated by OpenCVE AI on May 1, 2026 at 00:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-10564 Server-Side Request Forgery (SSRF) vulnerability in QuantumCloud SEO Help allows Server Side Request Forgery. This issue affects SEO Help: from n/a through 6.6.0.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Server-Side Request Forgery (SSRF) vulnerability in QuantumCloud SEO Help allows Server Side Request Forgery. This issue affects SEO Help: from n/a through 6.6.0. Server-Side Request Forgery (SSRF) vulnerability in QuantumCloud SEO Help seo-help allows Server Side Request Forgery.This issue affects SEO Help: from n/a through <= 6.7.9.
Title WordPress SEO Help plugin <= 6.6.0 - Server Side Request Forgery (SSRF) vulnerability WordPress SEO Help plugin <= 6.7.9 - Server Side Request Forgery (SSRF) vulnerability
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}


Wed, 09 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 09 Apr 2025 16:30:00 +0000

Type Values Removed Values Added
Description Server-Side Request Forgery (SSRF) vulnerability in QuantumCloud SEO Help allows Server Side Request Forgery. This issue affects SEO Help: from n/a through 6.6.0.
Title WordPress SEO Help plugin <= 6.6.0 - Server Side Request Forgery (SSRF) vulnerability
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:28.160Z

Reserved: 2025-04-09T11:21:18.307Z

Link: CVE-2025-32675

cve-icon Vulnrichment

Updated: 2025-04-09T17:42:47.936Z

cve-icon NVD

Status : Deferred

Published: 2025-04-09T17:15:51.383

Modified: 2026-04-23T15:29:19.737

Link: CVE-2025-32675

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T00:15:04Z

Weaknesses