Impact
The vulnerability is a Server‑Side Request Forgery in the ThemesInflow Hercules Core WordPress plugin, affecting all releases up to and including version 7.4. The flaw allows an attacker to trigger arbitrary HTTP requests from the web server to URLs supplied through the plugin, and is classified as CWE‑918, indicating insufficient validation of external URLs.
Affected Systems
Affects the ThemesInflow Hercules Core WordPress plugin. All releases from the earliest available version through 7.4 are impacted. No specific patch level is listed; upgrading to a newer version than 7.4 is required to remove the flaw.
Risk and Exploitability
The CVSS score of 4.9 denotes moderate severity, and the very low EPSS (<1%) indicates that widespread exploitation is unlikely. The flaw is not listed in the CISA KEV catalog. Attackers can exploit the vulnerability by supplying a crafted request to the plugin that causes the server to send outbound HTTP requests to arbitrary resources, a typical SSRF attack scenario.
OpenCVE Enrichment