Description
Server-Side Request Forgery (SSRF) vulnerability in solacewp Solace Extra solace-extra allows Server Side Request Forgery.This issue affects Solace Extra: from n/a through <= 1.3.2.
Published: 2025-08-27
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

In the Solace Extra WordPress plugin, a Server Side Request Forgery (SSRF) vulnerability allows an attacker to trigger outbound HTTP requests from the web server. An attacker can supply arbitrary URLs that the plugin then fetches, enabling potential exposure of internal network services or unauthorized data exfiltration. This weakness is identified as CWE–918 and can compromise confidentiality by retrieving sensitive resources that are otherwise inaccessible from the public Internet.

Affected Systems

The vulnerability is present in the Solace Extra plugin for WordPress, affecting all releases up to and including version 1.3.2. Systems running any of those versions, without an update, are susceptible.

Risk and Exploitability

The CVSS v3 score of 4.4 indicates a medium level of impact, but the EPSS score is below 1%, suggesting low current exploitation prevalence. The plugin is likely publicly accessible via WordPress sites, so an external attacker can trigger the SSRF by interacting with the plugin’s exposed endpoint. The issue is not listed in CISA’s KEV catalog, but the potential for unauthenticated attackers to read internal resources makes prompt remediation advisable.

Generated by OpenCVE AI on April 30, 2026 at 08:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Solace Extra to the latest available version that addresses the SSRF flaw (any release above 1.3.2).
  • If upgrade is not possible, disable or remove the plugin to prevent exploitation.
  • Configure the web server or firewall to restrict outbound HTTP requests from the WordPress process to trusted domains only.

Generated by OpenCVE AI on April 30, 2026 at 08:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-25927 Server-Side Request Forgery (SSRF) vulnerability in solacewp Solace Extra allows Server Side Request Forgery. This issue affects Solace Extra: from n/a through 1.3.2.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Server-Side Request Forgery (SSRF) vulnerability in solacewp Solace Extra allows Server Side Request Forgery. This issue affects Solace Extra: from n/a through 1.3.2. Server-Side Request Forgery (SSRF) vulnerability in solacewp Solace Extra solace-extra allows Server Side Request Forgery.This issue affects Solace Extra: from n/a through <= 1.3.2.
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N'}


Thu, 28 Aug 2025 07:45:00 +0000

Type Values Removed Values Added
First Time appeared Solacewp
Solacewp solace Extra
Wordpress
Wordpress wordpress
Vendors & Products Solacewp
Solacewp solace Extra
Wordpress
Wordpress wordpress

Wed, 27 Aug 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 27 Aug 2025 18:00:00 +0000

Type Values Removed Values Added
Description Server-Side Request Forgery (SSRF) vulnerability in solacewp Solace Extra allows Server Side Request Forgery. This issue affects Solace Extra: from n/a through 1.3.2.
Title WordPress Solace Extra Plugin <= 1.3.2 - Server Side Request Forgery (SSRF) Vulnerability
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Solacewp Solace Extra
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-05-12T00:36:03.974Z

Reserved: 2025-08-27T16:19:10.125Z

Link: CVE-2025-58203

cve-icon Vulnrichment

Updated: 2025-08-27T18:26:38.312Z

cve-icon NVD

Status : Deferred

Published: 2025-08-27T18:15:48.220

Modified: 2026-04-23T15:33:17.780

Link: CVE-2025-58203

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T08:15:32Z

Weaknesses