Impact
The vulnerability in the ShopLentor plugin allows an unauthenticated attacker to supply an arbitrary URL to the woolentor_template_proxy function, resulting in a server‑side request forgery (SSRF). With this flaw an adversary can have the WordPress application issue HTTP requests to any target, including internal services, potentially exposing sensitive data or manipulating internal resources. The weakness is classified as CWE‑918.
Affected Systems
The affected product is the ShopLentor – All‑in‑One WooCommerce Growth & Store Enhancement Plugin from devitemsllc. All released versions up to and including 3.1.2, which are supported on WordPress sites, are vulnerable. Sites running any of these versions are susceptible.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity. The EPSS score of less than 1% suggests a low likelihood of exploitation in the wild at this time, and the issue is not currently listed in the CISA KEV catalog. Because the SSRF endpoint accepts a URL parameter without authentication, the attack vector is a public URL that an attacker can control. If exploited, the attacker could harvest internal network information or perform additional actions against services that can be reached from the hosting environment.
OpenCVE Enrichment
EUVD