Impact
The vulnerability permits a server‑side request forgery (SSRF) where the SEO Backlink Monitor plugin can be instructed to fetch arbitrary URLs. This could allow an attacker to probe internal networks, retrieve sensitive information, or interact with services not exposed externally. The weakness is categorized as CWE‑918 and the CVSS score indicates moderate severity.
Affected Systems
The flaw impacts the WordPress SEO Backlink Monitor plugin from any version up to and including 1.8.0, supplied by activewebsight. Hosts running this plugin, specifically WordPress installations with the plugin installed, are at risk.
Risk and Exploitability
With a CVSS score of 4.4, the exploit potential is moderate, and the EPSS score of less than 1% suggests that exploitation is low‑probability at present. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a remote actor sending a crafted request to the plugin’s endpoint, assuming no additional access controls are present. No explicit exploitation method is detailed in the source, so the threat is inferred from the SSRF nature of the flaw.
OpenCVE Enrichment
EUVD