Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13411: CWE-918 Server-Side Request Forgery (SSRF) in zapier Zapier for WordPress

0
Medium
VulnerabilityCVE-2024-13411cvecve-2024-13411cwe-918
Published: Wed Mar 26 2025 (03/26/2025, 11:22:10 UTC)
Source: CVE Database V5
Vendor/Project: zapier
Product: Zapier for WordPress

Description

CVE-2024-13411 is a Server-Side Request Forgery (SSRF) vulnerability in the Zapier for WordPress plugin affecting all versions up to 1. 5. 1. Authenticated users with Subscriber-level access or higher can exploit this flaw via the updated_user() function to make arbitrary web requests from the server. This can lead to unauthorized querying and modification of internal services, potentially exposing sensitive data or enabling further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require low-level authentication. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent internal network reconnaissance and data exposure. Countries with high WordPress adoption and significant use of Zapier integrations are at greater risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:16:09 UTC

Technical Analysis

CVE-2024-13411 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Zapier for WordPress plugin, affecting all versions up to and including 1.5.1. The vulnerability resides in the updated_user() function, which improperly handles user input, allowing authenticated attackers with Subscriber-level privileges or higher to craft requests that the server executes on their behalf. SSRF vulnerabilities enable attackers to make HTTP requests from the vulnerable server to arbitrary internal or external locations, bypassing network restrictions and potentially accessing sensitive internal services that are not exposed externally. In this case, the attacker can query and modify information on internal services, which could lead to data leakage, unauthorized internal network reconnaissance, or manipulation of internal APIs. The vulnerability requires authentication but no user interaction, and the attack surface includes any WordPress site running the affected plugin versions. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low complexity, and low privileges required. No public exploits have been reported yet, but the risk remains significant given the widespread use of WordPress and Zapier integrations.

Potential Impact

The impact of CVE-2024-13411 can be substantial for organizations relying on WordPress sites integrated with Zapier. Exploitation can lead to unauthorized internal network scanning and data access, potentially exposing sensitive internal services that are otherwise protected by network segmentation or firewalls. Attackers could leverage this to gather intelligence, pivot to other internal systems, or modify internal data, undermining confidentiality and integrity. While availability impact is low, the breach of internal trust boundaries can facilitate further attacks such as privilege escalation or data exfiltration. Organizations with complex internal networks or sensitive internal APIs exposed only internally are at higher risk. The requirement for authenticated access limits exposure but does not eliminate risk, especially in environments where subscriber-level accounts are common or easily compromised.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update the Zapier for WordPress plugin to a patched version once available. Until a patch is released, restrict Subscriber-level user capabilities to the minimum necessary and monitor for suspicious activity related to user updates. Implement network-level controls to restrict outbound HTTP requests from the WordPress server to only trusted destinations, limiting the ability to perform SSRF attacks. Employ Web Application Firewalls (WAFs) with rules to detect and block SSRF patterns targeting the updated_user() function or related endpoints. Conduct regular audits of user accounts to ensure no unauthorized Subscriber-level accounts exist. Additionally, review internal services to ensure they are not unnecessarily exposed or accessible from the WordPress server. Logging and alerting on unusual internal requests originating from the WordPress server can help detect exploitation attempts early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-15T17:14:56.266Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e55b7ef31ef0b59e693

Added to database: 2/25/2026, 9:49:09 PM

Last enriched: 2/26/2026, 1:16:09 AM

Last updated: 2/26/2026, 1:35:56 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats