Description
Server-Side Request Forgery (SSRF) vulnerability in Craig Hewitt Seriously Simple Podcasting seriously-simple-podcasting allows Server Side Request Forgery.This issue affects Seriously Simple Podcasting: from n/a through <= 3.14.1.
Published: 2026-01-22
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server Side Request Forgery
Action: Patch Now
AI Analysis

Impact

The vulnerability is a Server‑Side Request Forgery in Craig Hewitt’s Seriously Simple Podcasting WordPress plugin, enabling an attacker to cause the server to perform arbitrary HTTP requests. This weakness is categorized as CWE‑918. Because the plugin accepts external URLs as input, the flaw can be exploited to direct the host to query any internal or external resource, potentially exposing data or triggering unintended actions. The vulnerability description does not specify the exact handling of the request, so the extent of potential damage is inferred from the general behavior of SSRF flaws.

Affected Systems

The flaw is present in all releases of Seriously Simple Podcasting distributed by Craig Hewitt up to and including version 3.14.1. WordPress sites who have installed any of those versions are therefore vulnerable until a patched release is applied.

Risk and Exploitability

The CVSS score of 4.4 indicates a moderate severity, while the EPSS score of less than 1 % suggests a low probability of active exploitation at present. The vulnerability is not listed in CISA’s KEV catalog. Based on the nature of SSRF, we infer that an attacker would need to supply a crafted URL or media reference to the plugin, which would then be forwarded by the host; with successful exploitation, the attacker could force outbound network traffic, potentially reaching internal resources or communicating with external endpoints. The current data do not confirm any known exploitation campaigns.

Generated by OpenCVE AI on April 28, 2026 at 22:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Seriously Simple Podcasting to version 3.15 or later to remove the SSRF defect.
  • If an update cannot be applied immediately, disable the plugin on the WordPress installation to eliminate the attack surface.
  • Review server logs for unexpected outbound requests originating from the plugin and consider network‑level filtering to block unauthorized outbound traffic during the remediation period.

Generated by OpenCVE AI on April 28, 2026 at 22:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}

cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Craig Hewitt
Craig Hewitt seriously Simple Podcasting
Wordpress
Wordpress wordpress
Vendors & Products Craig Hewitt
Craig Hewitt seriously Simple Podcasting
Wordpress
Wordpress wordpress

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description Server-Side Request Forgery (SSRF) vulnerability in Craig Hewitt Seriously Simple Podcasting seriously-simple-podcasting allows Server Side Request Forgery.This issue affects Seriously Simple Podcasting: from n/a through <= 3.14.1.
Title WordPress Seriously Simple Podcasting plugin <= 3.14.1 - Server Side Request Forgery (SSRF) vulnerability
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Craig Hewitt Seriously Simple Podcasting
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:47.972Z

Reserved: 2026-01-22T14:42:24.567Z

Link: CVE-2026-24360

cve-icon Vulnrichment

Updated: 2026-01-22T20:39:45.329Z

cve-icon NVD

Status : Deferred

Published: 2026-01-22T17:16:39.700

Modified: 2026-04-28T03:16:03.307

Link: CVE-2026-24360

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T22:45:25Z

Weaknesses