Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13904: CWE-918 Server-Side Request Forgery (SSRF) in platformlycom Platform.ly for WooCommerce

0
Medium
VulnerabilityCVE-2024-13904cvecve-2024-13904cwe-918
Published: Fri Mar 07 2025 (03/07/2025, 08:21:25 UTC)
Source: CVE Database V5
Vendor/Project: platformlycom
Product: Platform.ly for WooCommerce

Description

CVE-2024-13904 is a medium-severity Blind Server-Side Request Forgery (SSRF) vulnerability in the Platform. ly for WooCommerce WordPress plugin, affecting all versions up to 1. 1. 6. It allows unauthenticated attackers to make arbitrary web requests from the server via the 'hooks' function, potentially accessing or modifying internal services. Exploitation does not require user interaction or authentication, increasing risk. Although no known exploits are reported in the wild yet, the vulnerability can be leveraged to probe internal networks and gather sensitive information. The CVSS score is 5. 3, reflecting limited confidentiality impact and no integrity or availability impact. Organizations using this plugin should prioritize patching or mitigating this vulnerability to prevent internal network reconnaissance and potential further attacks.

AI-Powered Analysis

AILast updated: 02/26/2026, 09:09:32 UTC

Technical Analysis

CVE-2024-13904 is a Blind Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, found in the Platform.ly for WooCommerce plugin for WordPress. The vulnerability exists in all versions up to and including 1.1.6 within the 'hooks' function, which improperly handles user-supplied input to initiate server-side HTTP requests. An unauthenticated attacker can exploit this flaw to make arbitrary HTTP requests originating from the web server hosting the vulnerable plugin. This can allow attackers to interact with internal services that are otherwise inaccessible externally, potentially exposing sensitive internal endpoints or data. The 'blind' nature means the attacker may not see direct responses but can infer success through side channels or timing. The vulnerability does not require authentication or user interaction, increasing its exploitation potential. The CVSS 3.1 base score is 5.3 (medium), with vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, indicating network attack vector, low complexity, no privileges or user interaction needed, unchanged scope, limited confidentiality impact, and no integrity or availability impact. No patches or known exploits are currently reported, but the risk remains significant due to the nature of SSRF attacks and the widespread use of WooCommerce and WordPress.

Potential Impact

The primary impact of this SSRF vulnerability is the potential exposure of internal network resources and services that are normally shielded from external access. Attackers can leverage the vulnerability to perform reconnaissance on internal systems, potentially discovering sensitive endpoints such as metadata services, internal APIs, or administrative interfaces. While direct data modification or service disruption is not indicated, the information gathered could facilitate further attacks, including privilege escalation or lateral movement within the network. For organizations relying on Platform.ly for WooCommerce, this vulnerability could lead to unauthorized data disclosure and compromise of internal infrastructure security. The fact that exploitation requires no authentication or user interaction increases the risk of automated scanning and exploitation attempts. Although no active exploits are known, the vulnerability's presence in a popular e-commerce plugin used globally means many organizations could be affected, especially those with sensitive internal services accessible from the web server environment.

Mitigation Recommendations

To mitigate CVE-2024-13904, organizations should first check for any official patches or updates from the Platform.ly plugin vendor and apply them immediately once available. In the absence of patches, administrators should consider disabling or restricting the 'hooks' functionality if feasible. Implementing strict input validation and sanitization on any parameters that control server-side requests can reduce exploitation risk. Network-level mitigations include restricting outbound HTTP requests from the web server to only trusted destinations using firewall rules or egress filtering, thereby limiting the attacker's ability to reach internal services. Monitoring web server logs for unusual outbound requests or patterns indicative of SSRF attempts can help detect exploitation. Additionally, isolating the WordPress environment and minimizing its network privileges can reduce the potential impact. Employing Web Application Firewalls (WAFs) with SSRF detection capabilities may provide an additional layer of defense. Finally, organizations should conduct internal security assessments to identify and secure any sensitive internal endpoints that could be targeted via SSRF.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-02-24T17:53:43.692Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d1bb7ef31ef0b56dfbc

Added to database: 2/25/2026, 9:43:55 PM

Last enriched: 2/26/2026, 9:09:32 AM

Last updated: 2/26/2026, 11:09:00 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats