CVE-2024-13904: CWE-918 Server-Side Request Forgery (SSRF) in platformlycom Platform.ly for WooCommerce
CVE-2024-13904 is a medium-severity Blind Server-Side Request Forgery (SSRF) vulnerability in the Platform. ly for WooCommerce WordPress plugin, affecting all versions up to 1. 1. 6. It allows unauthenticated attackers to make arbitrary web requests from the server via the 'hooks' function, potentially accessing or modifying internal services. Exploitation does not require user interaction or authentication, increasing risk. Although no known exploits are reported in the wild yet, the vulnerability can be leveraged to probe internal networks and gather sensitive information. The CVSS score is 5. 3, reflecting limited confidentiality impact and no integrity or availability impact. Organizations using this plugin should prioritize patching or mitigating this vulnerability to prevent internal network reconnaissance and potential further attacks.
AI Analysis
Technical Summary
CVE-2024-13904 is a Blind Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, found in the Platform.ly for WooCommerce plugin for WordPress. The vulnerability exists in all versions up to and including 1.1.6 within the 'hooks' function, which improperly handles user-supplied input to initiate server-side HTTP requests. An unauthenticated attacker can exploit this flaw to make arbitrary HTTP requests originating from the web server hosting the vulnerable plugin. This can allow attackers to interact with internal services that are otherwise inaccessible externally, potentially exposing sensitive internal endpoints or data. The 'blind' nature means the attacker may not see direct responses but can infer success through side channels or timing. The vulnerability does not require authentication or user interaction, increasing its exploitation potential. The CVSS 3.1 base score is 5.3 (medium), with vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, indicating network attack vector, low complexity, no privileges or user interaction needed, unchanged scope, limited confidentiality impact, and no integrity or availability impact. No patches or known exploits are currently reported, but the risk remains significant due to the nature of SSRF attacks and the widespread use of WooCommerce and WordPress.
Potential Impact
The primary impact of this SSRF vulnerability is the potential exposure of internal network resources and services that are normally shielded from external access. Attackers can leverage the vulnerability to perform reconnaissance on internal systems, potentially discovering sensitive endpoints such as metadata services, internal APIs, or administrative interfaces. While direct data modification or service disruption is not indicated, the information gathered could facilitate further attacks, including privilege escalation or lateral movement within the network. For organizations relying on Platform.ly for WooCommerce, this vulnerability could lead to unauthorized data disclosure and compromise of internal infrastructure security. The fact that exploitation requires no authentication or user interaction increases the risk of automated scanning and exploitation attempts. Although no active exploits are known, the vulnerability's presence in a popular e-commerce plugin used globally means many organizations could be affected, especially those with sensitive internal services accessible from the web server environment.
Mitigation Recommendations
To mitigate CVE-2024-13904, organizations should first check for any official patches or updates from the Platform.ly plugin vendor and apply them immediately once available. In the absence of patches, administrators should consider disabling or restricting the 'hooks' functionality if feasible. Implementing strict input validation and sanitization on any parameters that control server-side requests can reduce exploitation risk. Network-level mitigations include restricting outbound HTTP requests from the web server to only trusted destinations using firewall rules or egress filtering, thereby limiting the attacker's ability to reach internal services. Monitoring web server logs for unusual outbound requests or patterns indicative of SSRF attempts can help detect exploitation. Additionally, isolating the WordPress environment and minimizing its network privileges can reduce the potential impact. Employing Web Application Firewalls (WAFs) with SSRF detection capabilities may provide an additional layer of defense. Finally, organizations should conduct internal security assessments to identify and secure any sensitive internal endpoints that could be targeted via SSRF.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-13904: CWE-918 Server-Side Request Forgery (SSRF) in platformlycom Platform.ly for WooCommerce
Description
CVE-2024-13904 is a medium-severity Blind Server-Side Request Forgery (SSRF) vulnerability in the Platform. ly for WooCommerce WordPress plugin, affecting all versions up to 1. 1. 6. It allows unauthenticated attackers to make arbitrary web requests from the server via the 'hooks' function, potentially accessing or modifying internal services. Exploitation does not require user interaction or authentication, increasing risk. Although no known exploits are reported in the wild yet, the vulnerability can be leveraged to probe internal networks and gather sensitive information. The CVSS score is 5. 3, reflecting limited confidentiality impact and no integrity or availability impact. Organizations using this plugin should prioritize patching or mitigating this vulnerability to prevent internal network reconnaissance and potential further attacks.
AI-Powered Analysis
Technical Analysis
CVE-2024-13904 is a Blind Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, found in the Platform.ly for WooCommerce plugin for WordPress. The vulnerability exists in all versions up to and including 1.1.6 within the 'hooks' function, which improperly handles user-supplied input to initiate server-side HTTP requests. An unauthenticated attacker can exploit this flaw to make arbitrary HTTP requests originating from the web server hosting the vulnerable plugin. This can allow attackers to interact with internal services that are otherwise inaccessible externally, potentially exposing sensitive internal endpoints or data. The 'blind' nature means the attacker may not see direct responses but can infer success through side channels or timing. The vulnerability does not require authentication or user interaction, increasing its exploitation potential. The CVSS 3.1 base score is 5.3 (medium), with vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, indicating network attack vector, low complexity, no privileges or user interaction needed, unchanged scope, limited confidentiality impact, and no integrity or availability impact. No patches or known exploits are currently reported, but the risk remains significant due to the nature of SSRF attacks and the widespread use of WooCommerce and WordPress.
Potential Impact
The primary impact of this SSRF vulnerability is the potential exposure of internal network resources and services that are normally shielded from external access. Attackers can leverage the vulnerability to perform reconnaissance on internal systems, potentially discovering sensitive endpoints such as metadata services, internal APIs, or administrative interfaces. While direct data modification or service disruption is not indicated, the information gathered could facilitate further attacks, including privilege escalation or lateral movement within the network. For organizations relying on Platform.ly for WooCommerce, this vulnerability could lead to unauthorized data disclosure and compromise of internal infrastructure security. The fact that exploitation requires no authentication or user interaction increases the risk of automated scanning and exploitation attempts. Although no active exploits are known, the vulnerability's presence in a popular e-commerce plugin used globally means many organizations could be affected, especially those with sensitive internal services accessible from the web server environment.
Mitigation Recommendations
To mitigate CVE-2024-13904, organizations should first check for any official patches or updates from the Platform.ly plugin vendor and apply them immediately once available. In the absence of patches, administrators should consider disabling or restricting the 'hooks' functionality if feasible. Implementing strict input validation and sanitization on any parameters that control server-side requests can reduce exploitation risk. Network-level mitigations include restricting outbound HTTP requests from the web server to only trusted destinations using firewall rules or egress filtering, thereby limiting the attacker's ability to reach internal services. Monitoring web server logs for unusual outbound requests or patterns indicative of SSRF attempts can help detect exploitation. Additionally, isolating the WordPress environment and minimizing its network privileges can reduce the potential impact. Employing Web Application Firewalls (WAFs) with SSRF detection capabilities may provide an additional layer of defense. Finally, organizations should conduct internal security assessments to identify and secure any sensitive internal endpoints that could be targeted via SSRF.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-02-24T17:53:43.692Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d1bb7ef31ef0b56dfbc
Added to database: 2/25/2026, 9:43:55 PM
Last enriched: 2/26/2026, 9:09:32 AM
Last updated: 2/26/2026, 11:09:00 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.