Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13695: CWE-918 Server-Side Request Forgery (SSRF) in Kriesi Enfold - Responsive Multi-Purpose Theme

0
Medium
VulnerabilityCVE-2024-13695cvecve-2024-13695cwe-918
Published: Tue Feb 25 2025 (02/25/2025, 09:21:33 UTC)
Source: CVE Database V5
Vendor/Project: Kriesi
Product: Enfold - Responsive Multi-Purpose Theme

Description

CVE-2024-13695 is a Server-Side Request Forgery (SSRF) vulnerability affecting the Enfold WordPress theme up to version 6. 0. 9. It allows authenticated users with Subscriber-level access or higher to make arbitrary web requests from the server via the 'attachment_id' parameter. This can lead to unauthorized querying and modification of internal services. The vulnerability has a CVSS score of 6. 4, indicating a medium severity level. Exploitation does not require user interaction but does require authentication with low privileges. No known exploits are currently reported in the wild. Organizations using the Enfold theme should prioritize patching or mitigating this issue to prevent potential internal network reconnaissance or data manipulation.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:46:08 UTC

Technical Analysis

CVE-2024-13695 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Enfold - Responsive Multi-Purpose Theme for WordPress, affecting all versions up to and including 6.0.9. SSRF vulnerabilities occur when an attacker can abuse a server-side application to send HTTP requests to arbitrary domains or internal network resources. In this case, the vulnerability is triggered via the 'attachment_id' parameter, which is improperly validated, allowing authenticated users with Subscriber-level privileges or higher to craft requests that the server executes. This can be leveraged to access internal services that are otherwise inaccessible externally, potentially exposing sensitive data or enabling further attacks such as internal network scanning or exploitation of other internal vulnerabilities. The vulnerability has a CVSS 3.1 base score of 6.4, reflecting medium severity, with attack vector as network, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with no impact on availability. Although no known exploits have been reported in the wild, the vulnerability poses a significant risk due to the low privilege required for exploitation and the potential to pivot within internal networks. The issue is particularly critical for organizations hosting WordPress sites with the Enfold theme, especially those with sensitive internal services behind firewalls. The lack of available patches at the time of reporting necessitates immediate mitigation efforts.

Potential Impact

The primary impact of CVE-2024-13695 is on the confidentiality and integrity of internal network resources. By exploiting the SSRF vulnerability, attackers with minimal privileges can send crafted requests from the vulnerable WordPress server to internal services, potentially accessing sensitive data or modifying internal configurations. This can lead to unauthorized data disclosure, privilege escalation, or lateral movement within an organization's network. While availability is not directly affected, the breach of internal services could indirectly disrupt operations if critical internal systems are compromised. Organizations using the Enfold theme are at risk of internal network reconnaissance and exploitation, which could facilitate more severe attacks such as data breaches or ransomware deployment. The medium CVSS score reflects the balance between the ease of exploitation (low complexity, authenticated user required) and the significant potential impact on internal systems. The threat is especially relevant for organizations with complex internal networks and sensitive data behind the WordPress server.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the WordPress admin area to trusted users only, minimizing the number of users with Subscriber-level or higher privileges. 2. Implement web application firewalls (WAF) with custom rules to detect and block suspicious requests targeting the 'attachment_id' parameter or unusual outbound requests originating from the WordPress server. 3. Network segmentation should be enforced to limit the WordPress server's ability to reach sensitive internal services, reducing the attack surface for SSRF exploitation. 4. Monitor logs for unusual outbound HTTP requests from the WordPress server, especially those targeting internal IP ranges or unexpected external domains. 5. Regularly update the Enfold theme once a patch is released by the vendor; until then, consider temporarily disabling or replacing the theme if feasible. 6. Employ strict input validation and sanitization on parameters that interact with external or internal resources. 7. Conduct internal security assessments to identify and secure any internal services that could be targeted via SSRF. 8. Educate site administrators about the risks of SSRF and the importance of limiting user privileges.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-23T20:53:47.459Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e68b7ef31ef0b5a019d

Added to database: 2/25/2026, 9:49:28 PM

Last enriched: 2/25/2026, 10:46:08 PM

Last updated: 2/26/2026, 6:12:45 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats