Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13905: CWE-918 Server-Side Request Forgery (SSRF) in sainwp OneStore Sites

0
Medium
VulnerabilityCVE-2024-13905cvecve-2024-13905cwe-918
Published: Thu Feb 27 2025 (02/27/2025, 04:21:45 UTC)
Source: CVE Database V5
Vendor/Project: sainwp
Product: OneStore Sites

Description

CVE-2024-13905 is a Server-Side Request Forgery (SSRF) vulnerability in the sainwp OneStore Sites WordPress plugin, affecting all versions up to 0. 1. 1. It allows unauthenticated attackers to make arbitrary web requests from the vulnerable server via the class-export. php file. This can lead to unauthorized querying and modification of internal services accessible from the server. The vulnerability has a CVSS score of 5. 3, indicating medium severity, with no authentication or user interaction required. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this issue to prevent potential internal network reconnaissance or data exposure.

AI-Powered Analysis

AILast updated: 02/26/2026, 09:09:44 UTC

Technical Analysis

CVE-2024-13905 is a Server-Side Request Forgery (SSRF) vulnerability identified in the sainwp OneStore Sites plugin for WordPress, specifically in all versions up to and including 0.1.1. The vulnerability resides in the class-export.php file, which improperly handles user-supplied input to generate web requests. This flaw enables unauthenticated attackers to coerce the vulnerable web application into making HTTP requests to arbitrary destinations, including internal network services that are otherwise inaccessible externally. SSRF vulnerabilities like this can be leveraged to perform internal network reconnaissance, access sensitive internal resources, or manipulate internal services by sending crafted requests. The vulnerability does not require authentication or user interaction, increasing its exploitation potential. The CVSS v3.1 base score is 5.3, reflecting a medium severity level due to the lack of impact on integrity or availability, but with confidentiality impact from potential internal data exposure. No public exploits or patches are currently available, indicating that organizations must rely on mitigations or vendor updates once released. The plugin’s market penetration is limited to WordPress sites using sainwp’s OneStore Sites, but given WordPress’s widespread use, the potential attack surface is non-trivial. The vulnerability highlights the risk of SSRF in web applications that interact with internal services without proper input validation or request filtering.

Potential Impact

The primary impact of CVE-2024-13905 is unauthorized internal network access and information disclosure. Attackers can exploit this SSRF vulnerability to probe internal services behind firewalls, potentially discovering sensitive endpoints, configuration data, or administrative interfaces not intended for public access. Although the vulnerability does not directly allow data modification or denial of service, the ability to query internal services can facilitate further attacks, such as lateral movement or exploitation of other internal vulnerabilities. Organizations hosting WordPress sites with the vulnerable plugin risk exposure of internal infrastructure details, which can aid attackers in crafting more sophisticated attacks. The lack of authentication requirement increases the risk of automated scanning and exploitation attempts. While no known exploits are currently in the wild, the medium severity rating suggests that attackers may develop exploits, especially targeting organizations with valuable internal services. The impact is more significant for organizations with sensitive internal networks accessible from the web server, such as enterprises, e-commerce platforms, and government agencies using this plugin.

Mitigation Recommendations

To mitigate CVE-2024-13905, organizations should first check for and apply any vendor-provided patches or updates for the sainwp OneStore Sites plugin once available. In the absence of patches, administrators should consider disabling or uninstalling the plugin to eliminate the attack vector. Implementing strict input validation and sanitization on any user-supplied data that influences server-side requests is critical. Network-level mitigations include restricting outbound HTTP requests from the web server to only trusted destinations using firewall rules or egress filtering, thereby preventing SSRF exploitation from reaching internal services. Monitoring web server logs for unusual outbound request patterns originating from the plugin’s endpoints can help detect exploitation attempts. Employing Web Application Firewalls (WAFs) with custom rules to block suspicious request parameters targeting class-export.php may provide temporary protection. Additionally, isolating the web server in a segmented network zone with minimal access to internal services reduces potential impact. Regular security audits and vulnerability scanning of WordPress plugins should be part of ongoing security hygiene.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-02-24T18:06:40.517Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d1bb7ef31ef0b56dfc1

Added to database: 2/25/2026, 9:43:55 PM

Last enriched: 2/26/2026, 9:09:44 AM

Last updated: 2/26/2026, 11:09:09 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats