CVE-2024-13905: CWE-918 Server-Side Request Forgery (SSRF) in sainwp OneStore Sites
CVE-2024-13905 is a Server-Side Request Forgery (SSRF) vulnerability in the sainwp OneStore Sites WordPress plugin, affecting all versions up to 0. 1. 1. It allows unauthenticated attackers to make arbitrary web requests from the vulnerable server via the class-export. php file. This can lead to unauthorized querying and modification of internal services accessible from the server. The vulnerability has a CVSS score of 5. 3, indicating medium severity, with no authentication or user interaction required. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this issue to prevent potential internal network reconnaissance or data exposure.
AI Analysis
Technical Summary
CVE-2024-13905 is a Server-Side Request Forgery (SSRF) vulnerability identified in the sainwp OneStore Sites plugin for WordPress, specifically in all versions up to and including 0.1.1. The vulnerability resides in the class-export.php file, which improperly handles user-supplied input to generate web requests. This flaw enables unauthenticated attackers to coerce the vulnerable web application into making HTTP requests to arbitrary destinations, including internal network services that are otherwise inaccessible externally. SSRF vulnerabilities like this can be leveraged to perform internal network reconnaissance, access sensitive internal resources, or manipulate internal services by sending crafted requests. The vulnerability does not require authentication or user interaction, increasing its exploitation potential. The CVSS v3.1 base score is 5.3, reflecting a medium severity level due to the lack of impact on integrity or availability, but with confidentiality impact from potential internal data exposure. No public exploits or patches are currently available, indicating that organizations must rely on mitigations or vendor updates once released. The plugin’s market penetration is limited to WordPress sites using sainwp’s OneStore Sites, but given WordPress’s widespread use, the potential attack surface is non-trivial. The vulnerability highlights the risk of SSRF in web applications that interact with internal services without proper input validation or request filtering.
Potential Impact
The primary impact of CVE-2024-13905 is unauthorized internal network access and information disclosure. Attackers can exploit this SSRF vulnerability to probe internal services behind firewalls, potentially discovering sensitive endpoints, configuration data, or administrative interfaces not intended for public access. Although the vulnerability does not directly allow data modification or denial of service, the ability to query internal services can facilitate further attacks, such as lateral movement or exploitation of other internal vulnerabilities. Organizations hosting WordPress sites with the vulnerable plugin risk exposure of internal infrastructure details, which can aid attackers in crafting more sophisticated attacks. The lack of authentication requirement increases the risk of automated scanning and exploitation attempts. While no known exploits are currently in the wild, the medium severity rating suggests that attackers may develop exploits, especially targeting organizations with valuable internal services. The impact is more significant for organizations with sensitive internal networks accessible from the web server, such as enterprises, e-commerce platforms, and government agencies using this plugin.
Mitigation Recommendations
To mitigate CVE-2024-13905, organizations should first check for and apply any vendor-provided patches or updates for the sainwp OneStore Sites plugin once available. In the absence of patches, administrators should consider disabling or uninstalling the plugin to eliminate the attack vector. Implementing strict input validation and sanitization on any user-supplied data that influences server-side requests is critical. Network-level mitigations include restricting outbound HTTP requests from the web server to only trusted destinations using firewall rules or egress filtering, thereby preventing SSRF exploitation from reaching internal services. Monitoring web server logs for unusual outbound request patterns originating from the plugin’s endpoints can help detect exploitation attempts. Employing Web Application Firewalls (WAFs) with custom rules to block suspicious request parameters targeting class-export.php may provide temporary protection. Additionally, isolating the web server in a segmented network zone with minimal access to internal services reduces potential impact. Regular security audits and vulnerability scanning of WordPress plugins should be part of ongoing security hygiene.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, France, Brazil, Netherlands, Japan
CVE-2024-13905: CWE-918 Server-Side Request Forgery (SSRF) in sainwp OneStore Sites
Description
CVE-2024-13905 is a Server-Side Request Forgery (SSRF) vulnerability in the sainwp OneStore Sites WordPress plugin, affecting all versions up to 0. 1. 1. It allows unauthenticated attackers to make arbitrary web requests from the vulnerable server via the class-export. php file. This can lead to unauthorized querying and modification of internal services accessible from the server. The vulnerability has a CVSS score of 5. 3, indicating medium severity, with no authentication or user interaction required. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this issue to prevent potential internal network reconnaissance or data exposure.
AI-Powered Analysis
Technical Analysis
CVE-2024-13905 is a Server-Side Request Forgery (SSRF) vulnerability identified in the sainwp OneStore Sites plugin for WordPress, specifically in all versions up to and including 0.1.1. The vulnerability resides in the class-export.php file, which improperly handles user-supplied input to generate web requests. This flaw enables unauthenticated attackers to coerce the vulnerable web application into making HTTP requests to arbitrary destinations, including internal network services that are otherwise inaccessible externally. SSRF vulnerabilities like this can be leveraged to perform internal network reconnaissance, access sensitive internal resources, or manipulate internal services by sending crafted requests. The vulnerability does not require authentication or user interaction, increasing its exploitation potential. The CVSS v3.1 base score is 5.3, reflecting a medium severity level due to the lack of impact on integrity or availability, but with confidentiality impact from potential internal data exposure. No public exploits or patches are currently available, indicating that organizations must rely on mitigations or vendor updates once released. The plugin’s market penetration is limited to WordPress sites using sainwp’s OneStore Sites, but given WordPress’s widespread use, the potential attack surface is non-trivial. The vulnerability highlights the risk of SSRF in web applications that interact with internal services without proper input validation or request filtering.
Potential Impact
The primary impact of CVE-2024-13905 is unauthorized internal network access and information disclosure. Attackers can exploit this SSRF vulnerability to probe internal services behind firewalls, potentially discovering sensitive endpoints, configuration data, or administrative interfaces not intended for public access. Although the vulnerability does not directly allow data modification or denial of service, the ability to query internal services can facilitate further attacks, such as lateral movement or exploitation of other internal vulnerabilities. Organizations hosting WordPress sites with the vulnerable plugin risk exposure of internal infrastructure details, which can aid attackers in crafting more sophisticated attacks. The lack of authentication requirement increases the risk of automated scanning and exploitation attempts. While no known exploits are currently in the wild, the medium severity rating suggests that attackers may develop exploits, especially targeting organizations with valuable internal services. The impact is more significant for organizations with sensitive internal networks accessible from the web server, such as enterprises, e-commerce platforms, and government agencies using this plugin.
Mitigation Recommendations
To mitigate CVE-2024-13905, organizations should first check for and apply any vendor-provided patches or updates for the sainwp OneStore Sites plugin once available. In the absence of patches, administrators should consider disabling or uninstalling the plugin to eliminate the attack vector. Implementing strict input validation and sanitization on any user-supplied data that influences server-side requests is critical. Network-level mitigations include restricting outbound HTTP requests from the web server to only trusted destinations using firewall rules or egress filtering, thereby preventing SSRF exploitation from reaching internal services. Monitoring web server logs for unusual outbound request patterns originating from the plugin’s endpoints can help detect exploitation attempts. Employing Web Application Firewalls (WAFs) with custom rules to block suspicious request parameters targeting class-export.php may provide temporary protection. Additionally, isolating the web server in a segmented network zone with minimal access to internal services reduces potential impact. Regular security audits and vulnerability scanning of WordPress plugins should be part of ongoing security hygiene.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-02-24T18:06:40.517Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d1bb7ef31ef0b56dfc1
Added to database: 2/25/2026, 9:43:55 PM
Last enriched: 2/26/2026, 9:09:44 AM
Last updated: 2/26/2026, 11:09:09 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.