Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13697: CWE-918 Server-Side Request Forgery (SSRF) in wordplus Better Messages – Live Chat for WordPress, BuddyPress, PeepSo, Ultimate Member, BuddyBoss

0
Medium
VulnerabilityCVE-2024-13697cvecve-2024-13697cwe-918
Published: Sat Mar 01 2025 (03/01/2025, 08:23:21 UTC)
Source: CVE Database V5
Vendor/Project: wordplus
Product: Better Messages – Live Chat for WordPress, BuddyPress, PeepSo, Ultimate Member, BuddyBoss

Description

CVE-2024-13697 is a Server-Side Request Forgery (SSRF) vulnerability affecting the Better Messages – Live Chat plugin for WordPress and related platforms such as BuddyPress, PeepSo, Ultimate Member, and BuddyBoss. The vulnerability exists in all versions up to and including 2. 7. 4 and is triggered via the 'nice_links' feature when 'Enable link previews' is enabled, which is the default setting. This flaw allows unauthenticated attackers to make arbitrary web requests from the server hosting the plugin, potentially accessing or modifying internal services. The CVSS score is 4. 8, indicating medium severity, with low confidentiality and integrity impact, no availability impact, and requiring no authentication but high attack complexity. No known exploits are currently reported in the wild. Organizations using this plugin should disable link previews or update the plugin once a patch is available to mitigate risk. The threat primarily affects websites using these WordPress plugins, with higher risk in countries with widespread WordPress adoption and significant use of these social and community plugins.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:45:54 UTC

Technical Analysis

CVE-2024-13697 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Better Messages – Live Chat plugin for WordPress and its integrations with BuddyPress, PeepSo, Ultimate Member, and BuddyBoss platforms. The vulnerability resides in the 'nice_links' functionality, which processes URLs to generate link previews when the 'Enable link previews' feature is active (enabled by default). An unauthenticated attacker can exploit this flaw by crafting malicious requests that cause the server to initiate HTTP requests to arbitrary internal or external locations. This can lead to unauthorized querying or modification of internal services that are otherwise inaccessible externally, potentially exposing sensitive information or enabling further attacks within the internal network. The vulnerability affects all plugin versions up to and including 2.7.4. The CVSS 3.1 base score of 4.8 reflects a medium severity rating, with the vector indicating network attack vector, high attack complexity, no privileges required, no user interaction, unchanged scope, and low impacts on confidentiality and integrity, with no impact on availability. No public exploits or active exploitation have been reported yet. The vulnerability was published on March 1, 2025, and was reserved on January 23, 2025. No official patches have been linked at this time, so mitigation relies on configuration changes or monitoring until updates are released.

Potential Impact

The SSRF vulnerability allows attackers to leverage the web server hosting the vulnerable plugin to send crafted requests to internal or external systems, potentially bypassing network access controls. This can lead to unauthorized access to internal services, such as databases, metadata services in cloud environments, or administrative interfaces not exposed externally. Although the CVSS score indicates medium severity, the impact on confidentiality and integrity can be significant depending on the internal network architecture and the sensitivity of accessible services. Attackers could use this vector to gather internal information, perform reconnaissance, or pivot to other attacks. The lack of authentication requirement increases the risk, as any unauthenticated user can attempt exploitation. However, the high attack complexity and requirement for the 'Enable link previews' feature to be active limit the ease of exploitation. Organizations running affected versions of the plugin on public-facing WordPress sites are at risk, especially those with sensitive internal services accessible from the web server. The vulnerability does not impact availability directly but can facilitate further attacks that might.

Mitigation Recommendations

Until an official patch is released, organizations should immediately disable the 'Enable link previews' feature in the Better Messages plugin settings to prevent SSRF exploitation. Administrators should audit and restrict outbound HTTP requests from the web server hosting the plugin, using firewall rules or web application firewalls (WAFs) to limit requests to trusted destinations only. Monitoring web server logs for unusual outbound requests or spikes in traffic to internal IP ranges can help detect exploitation attempts. It is also recommended to update the plugin promptly once a security patch is available. Additionally, internal services should be segmented and protected with strong access controls to minimize the impact of SSRF attacks. Employing network-level protections such as egress filtering and implementing least privilege principles for server processes can further reduce risk. Regular vulnerability scanning and penetration testing focusing on SSRF vectors in web applications can help identify similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-23T23:19:17.165Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e69b7ef31ef0b5a0270

Added to database: 2/25/2026, 9:49:29 PM

Last enriched: 2/25/2026, 10:45:54 PM

Last updated: 2/26/2026, 7:29:22 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats