Description
Server-Side Request Forgery (SSRF) vulnerability in Chartbeat Chartbeat chartbeat allows Server Side Request Forgery.This issue affects Chartbeat: from n/a through <= 2.0.7.
Published: 2025-08-28
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Chartbeat WordPress plugin up to version 2.0.7 contains a server‑side request forgery vulnerability that allows an attacker to instruct the server to fetch arbitrary URLs. Based on the description, it is inferred that the plugin does not perform verification of the target URL, which could enable the attacker to reach internal network services or obtain sensitive data that the server can access. This may lead to information disclosure and potential exploitation of internal resources.

Affected Systems

WordPress sites that have the Chartbeat plugin installed from any version through 2.0.7 are affected. The vulnerability is present for all releases of the Chartbeat product in this range.

Risk and Exploitability

The CVSS score of 6.4 indicates medium severity, but the EPSS score of less than 1% suggests that exploitation attempts are unlikely at present. The vulnerability is not listed in the CISA KEV catalog, further indicating limited or no widespread exploitation. Attackers would need access to the site’s administrative interface or ability to trigger the plugin’s request mechanism, implying a remote or web‑based attack vector; this inference is drawn from the description.

Generated by OpenCVE AI on May 2, 2026 at 01:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Chartbeat plugin to the latest version (>= 2.0.8) to eliminate the SSRF flaw.
  • If an update cannot be performed immediately, restrict outgoing requests from WordPress to external domains only by configuring the web server or firewall to block internal IP ranges such as 127.0.0.1, 10.0.0.0/8, 192.168.0.0/16 and localhost URLs.
  • Disable the Chartbeat plugin until a patch is available, or remove it entirely if the service is not required.

Generated by OpenCVE AI on May 2, 2026 at 01:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-25993 Server-Side Request Forgery (SSRF) vulnerability in Chartbeat Chartbeat allows Server Side Request Forgery. This issue affects Chartbeat: from n/a through 2.0.7.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Server-Side Request Forgery (SSRF) vulnerability in Chartbeat Chartbeat allows Server Side Request Forgery. This issue affects Chartbeat: from n/a through 2.0.7. Server-Side Request Forgery (SSRF) vulnerability in Chartbeat Chartbeat chartbeat allows Server Side Request Forgery.This issue affects Chartbeat: from n/a through <= 2.0.7.
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Thu, 28 Aug 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 28 Aug 2025 13:00:00 +0000

Type Values Removed Values Added
Description Server-Side Request Forgery (SSRF) vulnerability in Chartbeat Chartbeat allows Server Side Request Forgery. This issue affects Chartbeat: from n/a through 2.0.7.
Title WordPress Chartbeat Plugin <= 2.0.7 - Server Side Request Forgery (SSRF) Vulnerability
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:21.824Z

Reserved: 2025-06-27T10:28:19.988Z

Link: CVE-2025-53250

cve-icon Vulnrichment

Updated: 2025-08-28T14:47:01.318Z

cve-icon NVD

Status : Deferred

Published: 2025-08-28T13:16:03.310

Modified: 2026-04-23T15:32:21.540

Link: CVE-2025-53250

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T01:15:06Z

Weaknesses