Impact
WordPress WebinarPress plugin contains a Server Side Request Forgery (SSRF) vulnerability that allows an attacker to instruct the WordPress server to make arbitrary HTTP or HTTPS requests to internal or external resources. An exploit could expose internal network services, retrieve sensitive data, and potentially serve as a foothold for more advanced attacks if the data retrieved can be leveraged further.
Affected Systems
The vulnerability applies to the WordPress WebinarPress plugin developed by WPWebinarSystem for any installations running version 1.33.28 or earlier. Any WordPress site with this plugin version installed is at risk until the plugin is updated beyond 1.33.28 or removed.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate severity, while the EPSS score of less than 1% suggests the likelihood of exploitation is currently low. The vulnerability has not been reported by CISA in the KEV catalog. The attack vector is likely a crafted web request sent to the vulnerable endpoint, where improper validation of user‑supplied URLs enables the server to access arbitrary addresses.
OpenCVE Enrichment
EUVD