CVE-2024-13697: CWE-918 Server-Side Request Forgery (SSRF) in wordplus Better Messages – Live Chat for WordPress, BuddyPress, PeepSo, Ultimate Member, BuddyBoss
CVE-2024-13697 is a Server-Side Request Forgery (SSRF) vulnerability affecting the Better Messages – Live Chat plugin for WordPress and related platforms such as BuddyPress, PeepSo, Ultimate Member, and BuddyBoss. The vulnerability exists in all versions up to and including 2. 7. 4 and is triggered via the 'nice_links' feature when 'Enable link previews' is enabled, which is the default setting. This flaw allows unauthenticated attackers to make arbitrary web requests from the server hosting the plugin, potentially accessing or modifying internal services. The CVSS score is 4. 8, indicating medium severity, with low confidentiality and integrity impact, no availability impact, and requiring no authentication but high attack complexity. No known exploits are currently reported in the wild. Organizations using this plugin should disable link previews or update the plugin once a patch is available to mitigate risk. The threat primarily affects websites using these WordPress plugins, with higher risk in countries with widespread WordPress adoption and significant use of these social and community plugins.
AI Analysis
Technical Summary
CVE-2024-13697 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Better Messages – Live Chat plugin for WordPress and its integrations with BuddyPress, PeepSo, Ultimate Member, and BuddyBoss platforms. The vulnerability resides in the 'nice_links' functionality, which processes URLs to generate link previews when the 'Enable link previews' feature is active (enabled by default). An unauthenticated attacker can exploit this flaw by crafting malicious requests that cause the server to initiate HTTP requests to arbitrary internal or external locations. This can lead to unauthorized querying or modification of internal services that are otherwise inaccessible externally, potentially exposing sensitive information or enabling further attacks within the internal network. The vulnerability affects all plugin versions up to and including 2.7.4. The CVSS 3.1 base score of 4.8 reflects a medium severity rating, with the vector indicating network attack vector, high attack complexity, no privileges required, no user interaction, unchanged scope, and low impacts on confidentiality and integrity, with no impact on availability. No public exploits or active exploitation have been reported yet. The vulnerability was published on March 1, 2025, and was reserved on January 23, 2025. No official patches have been linked at this time, so mitigation relies on configuration changes or monitoring until updates are released.
Potential Impact
The SSRF vulnerability allows attackers to leverage the web server hosting the vulnerable plugin to send crafted requests to internal or external systems, potentially bypassing network access controls. This can lead to unauthorized access to internal services, such as databases, metadata services in cloud environments, or administrative interfaces not exposed externally. Although the CVSS score indicates medium severity, the impact on confidentiality and integrity can be significant depending on the internal network architecture and the sensitivity of accessible services. Attackers could use this vector to gather internal information, perform reconnaissance, or pivot to other attacks. The lack of authentication requirement increases the risk, as any unauthenticated user can attempt exploitation. However, the high attack complexity and requirement for the 'Enable link previews' feature to be active limit the ease of exploitation. Organizations running affected versions of the plugin on public-facing WordPress sites are at risk, especially those with sensitive internal services accessible from the web server. The vulnerability does not impact availability directly but can facilitate further attacks that might.
Mitigation Recommendations
Until an official patch is released, organizations should immediately disable the 'Enable link previews' feature in the Better Messages plugin settings to prevent SSRF exploitation. Administrators should audit and restrict outbound HTTP requests from the web server hosting the plugin, using firewall rules or web application firewalls (WAFs) to limit requests to trusted destinations only. Monitoring web server logs for unusual outbound requests or spikes in traffic to internal IP ranges can help detect exploitation attempts. It is also recommended to update the plugin promptly once a security patch is available. Additionally, internal services should be segmented and protected with strong access controls to minimize the impact of SSRF attacks. Employing network-level protections such as egress filtering and implementing least privilege principles for server processes can further reduce risk. Regular vulnerability scanning and penetration testing focusing on SSRF vectors in web applications can help identify similar issues proactively.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-13697: CWE-918 Server-Side Request Forgery (SSRF) in wordplus Better Messages – Live Chat for WordPress, BuddyPress, PeepSo, Ultimate Member, BuddyBoss
Description
CVE-2024-13697 is a Server-Side Request Forgery (SSRF) vulnerability affecting the Better Messages – Live Chat plugin for WordPress and related platforms such as BuddyPress, PeepSo, Ultimate Member, and BuddyBoss. The vulnerability exists in all versions up to and including 2. 7. 4 and is triggered via the 'nice_links' feature when 'Enable link previews' is enabled, which is the default setting. This flaw allows unauthenticated attackers to make arbitrary web requests from the server hosting the plugin, potentially accessing or modifying internal services. The CVSS score is 4. 8, indicating medium severity, with low confidentiality and integrity impact, no availability impact, and requiring no authentication but high attack complexity. No known exploits are currently reported in the wild. Organizations using this plugin should disable link previews or update the plugin once a patch is available to mitigate risk. The threat primarily affects websites using these WordPress plugins, with higher risk in countries with widespread WordPress adoption and significant use of these social and community plugins.
AI-Powered Analysis
Technical Analysis
CVE-2024-13697 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Better Messages – Live Chat plugin for WordPress and its integrations with BuddyPress, PeepSo, Ultimate Member, and BuddyBoss platforms. The vulnerability resides in the 'nice_links' functionality, which processes URLs to generate link previews when the 'Enable link previews' feature is active (enabled by default). An unauthenticated attacker can exploit this flaw by crafting malicious requests that cause the server to initiate HTTP requests to arbitrary internal or external locations. This can lead to unauthorized querying or modification of internal services that are otherwise inaccessible externally, potentially exposing sensitive information or enabling further attacks within the internal network. The vulnerability affects all plugin versions up to and including 2.7.4. The CVSS 3.1 base score of 4.8 reflects a medium severity rating, with the vector indicating network attack vector, high attack complexity, no privileges required, no user interaction, unchanged scope, and low impacts on confidentiality and integrity, with no impact on availability. No public exploits or active exploitation have been reported yet. The vulnerability was published on March 1, 2025, and was reserved on January 23, 2025. No official patches have been linked at this time, so mitigation relies on configuration changes or monitoring until updates are released.
Potential Impact
The SSRF vulnerability allows attackers to leverage the web server hosting the vulnerable plugin to send crafted requests to internal or external systems, potentially bypassing network access controls. This can lead to unauthorized access to internal services, such as databases, metadata services in cloud environments, or administrative interfaces not exposed externally. Although the CVSS score indicates medium severity, the impact on confidentiality and integrity can be significant depending on the internal network architecture and the sensitivity of accessible services. Attackers could use this vector to gather internal information, perform reconnaissance, or pivot to other attacks. The lack of authentication requirement increases the risk, as any unauthenticated user can attempt exploitation. However, the high attack complexity and requirement for the 'Enable link previews' feature to be active limit the ease of exploitation. Organizations running affected versions of the plugin on public-facing WordPress sites are at risk, especially those with sensitive internal services accessible from the web server. The vulnerability does not impact availability directly but can facilitate further attacks that might.
Mitigation Recommendations
Until an official patch is released, organizations should immediately disable the 'Enable link previews' feature in the Better Messages plugin settings to prevent SSRF exploitation. Administrators should audit and restrict outbound HTTP requests from the web server hosting the plugin, using firewall rules or web application firewalls (WAFs) to limit requests to trusted destinations only. Monitoring web server logs for unusual outbound requests or spikes in traffic to internal IP ranges can help detect exploitation attempts. It is also recommended to update the plugin promptly once a security patch is available. Additionally, internal services should be segmented and protected with strong access controls to minimize the impact of SSRF attacks. Employing network-level protections such as egress filtering and implementing least privilege principles for server processes can further reduce risk. Regular vulnerability scanning and penetration testing focusing on SSRF vectors in web applications can help identify similar issues proactively.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-23T23:19:17.165Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e69b7ef31ef0b5a0270
Added to database: 2/25/2026, 9:49:29 PM
Last enriched: 2/25/2026, 10:45:54 PM
Last updated: 2/26/2026, 7:29:22 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.