CVE-2024-1467: CWE-918 Server-Side Request Forgery (SSRF) in brainstormforce Starter Templates — Elementor, WordPress & Beaver Builder Templates
CVE-2024-1467 is a Server-Side Request Forgery (SSRF) vulnerability found in the Starter Templates plugin for WordPress, which supports Elementor, WordPress, and Beaver Builder templates. This vulnerability affects all versions up to and including 4. 1. 6 and allows authenticated users with contributor-level access or higher to make arbitrary web requests from the server. Exploiting this flaw can enable attackers to interact with internal services, potentially querying or modifying sensitive information. The vulnerability does not require user interaction beyond authentication and has a CVSS score of 4. 3, indicating medium severity. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this issue to prevent internal network reconnaissance or data manipulation. The threat primarily impacts WordPress sites using this plugin globally, especially in countries with high WordPress adoption and significant web infrastructure.
AI Analysis
Technical Summary
CVE-2024-1467 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, affecting the Starter Templates plugin for WordPress, which integrates with Elementor, WordPress, and Beaver Builder templates. The vulnerability exists in the ai_api_request() function, which improperly handles web requests initiated by authenticated users with contributor-level permissions or higher. This flaw allows such users to craft requests to arbitrary URLs from the server hosting the WordPress site, potentially accessing internal network resources that are not otherwise exposed externally. Since the plugin versions up to 4.1.6 are affected, any site running these versions is vulnerable. The SSRF can be leveraged to query internal services, potentially exposing sensitive information or enabling further attacks such as internal port scanning, data exfiltration, or modification of internal resources. The vulnerability requires authentication but no additional user interaction, making it exploitable by any user with contributor or higher roles. The CVSS v3.1 score of 4.3 reflects a medium severity, primarily due to the limited privilege requirement and the impact on integrity without direct confidentiality or availability compromise. No public exploits have been reported yet, but the vulnerability's presence in a widely used WordPress plugin makes it a significant concern for website administrators. The lack of an official patch link indicates that mitigation may currently rely on access control and monitoring until an update is released.
Potential Impact
The SSRF vulnerability in the Starter Templates plugin can have several impacts on affected organizations. Attackers with contributor-level access can exploit the vulnerability to make arbitrary HTTP requests from the server, potentially accessing internal services that are not exposed externally. This can lead to unauthorized information disclosure, such as internal API data, metadata services in cloud environments, or other sensitive endpoints. Additionally, attackers might modify internal data or configurations if internal services are writable, impacting data integrity. While the vulnerability does not directly affect availability or confidentiality of external data, it can be a stepping stone for lateral movement within the network or further exploitation. Organizations relying on this plugin for WordPress sites may face increased risk of internal reconnaissance and targeted attacks, especially if contributor roles are assigned to untrusted users. The medium severity score suggests that while the risk is not critical, it is significant enough to warrant prompt attention to prevent exploitation and potential escalation.
Mitigation Recommendations
To mitigate CVE-2024-1467, organizations should take several specific actions beyond generic advice: 1) Immediately audit and restrict contributor-level and higher user roles to trusted personnel only, minimizing the number of users who can exploit the vulnerability. 2) Monitor and log outgoing HTTP requests originating from the WordPress server to detect unusual or unauthorized internal requests indicative of SSRF exploitation. 3) Implement network segmentation and firewall rules to limit the WordPress server's ability to access sensitive internal services or metadata endpoints, reducing the attack surface. 4) Disable or restrict the ai_api_request() functionality if possible, or apply custom patches or workarounds until an official update is released. 5) Stay informed about updates from Brainstormforce and apply patches promptly once available. 6) Consider deploying Web Application Firewalls (WAFs) with rules to detect and block SSRF patterns targeting this plugin. 7) Regularly review plugin usage and remove or replace vulnerable plugins where feasible to reduce exposure.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, Brazil, France, Netherlands, Japan, Italy, Spain
CVE-2024-1467: CWE-918 Server-Side Request Forgery (SSRF) in brainstormforce Starter Templates — Elementor, WordPress & Beaver Builder Templates
Description
CVE-2024-1467 is a Server-Side Request Forgery (SSRF) vulnerability found in the Starter Templates plugin for WordPress, which supports Elementor, WordPress, and Beaver Builder templates. This vulnerability affects all versions up to and including 4. 1. 6 and allows authenticated users with contributor-level access or higher to make arbitrary web requests from the server. Exploiting this flaw can enable attackers to interact with internal services, potentially querying or modifying sensitive information. The vulnerability does not require user interaction beyond authentication and has a CVSS score of 4. 3, indicating medium severity. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this issue to prevent internal network reconnaissance or data manipulation. The threat primarily impacts WordPress sites using this plugin globally, especially in countries with high WordPress adoption and significant web infrastructure.
AI-Powered Analysis
Technical Analysis
CVE-2024-1467 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, affecting the Starter Templates plugin for WordPress, which integrates with Elementor, WordPress, and Beaver Builder templates. The vulnerability exists in the ai_api_request() function, which improperly handles web requests initiated by authenticated users with contributor-level permissions or higher. This flaw allows such users to craft requests to arbitrary URLs from the server hosting the WordPress site, potentially accessing internal network resources that are not otherwise exposed externally. Since the plugin versions up to 4.1.6 are affected, any site running these versions is vulnerable. The SSRF can be leveraged to query internal services, potentially exposing sensitive information or enabling further attacks such as internal port scanning, data exfiltration, or modification of internal resources. The vulnerability requires authentication but no additional user interaction, making it exploitable by any user with contributor or higher roles. The CVSS v3.1 score of 4.3 reflects a medium severity, primarily due to the limited privilege requirement and the impact on integrity without direct confidentiality or availability compromise. No public exploits have been reported yet, but the vulnerability's presence in a widely used WordPress plugin makes it a significant concern for website administrators. The lack of an official patch link indicates that mitigation may currently rely on access control and monitoring until an update is released.
Potential Impact
The SSRF vulnerability in the Starter Templates plugin can have several impacts on affected organizations. Attackers with contributor-level access can exploit the vulnerability to make arbitrary HTTP requests from the server, potentially accessing internal services that are not exposed externally. This can lead to unauthorized information disclosure, such as internal API data, metadata services in cloud environments, or other sensitive endpoints. Additionally, attackers might modify internal data or configurations if internal services are writable, impacting data integrity. While the vulnerability does not directly affect availability or confidentiality of external data, it can be a stepping stone for lateral movement within the network or further exploitation. Organizations relying on this plugin for WordPress sites may face increased risk of internal reconnaissance and targeted attacks, especially if contributor roles are assigned to untrusted users. The medium severity score suggests that while the risk is not critical, it is significant enough to warrant prompt attention to prevent exploitation and potential escalation.
Mitigation Recommendations
To mitigate CVE-2024-1467, organizations should take several specific actions beyond generic advice: 1) Immediately audit and restrict contributor-level and higher user roles to trusted personnel only, minimizing the number of users who can exploit the vulnerability. 2) Monitor and log outgoing HTTP requests originating from the WordPress server to detect unusual or unauthorized internal requests indicative of SSRF exploitation. 3) Implement network segmentation and firewall rules to limit the WordPress server's ability to access sensitive internal services or metadata endpoints, reducing the attack surface. 4) Disable or restrict the ai_api_request() functionality if possible, or apply custom patches or workarounds until an official update is released. 5) Stay informed about updates from Brainstormforce and apply patches promptly once available. 6) Consider deploying Web Application Firewalls (WAFs) with rules to detect and block SSRF patterns targeting this plugin. 7) Regularly review plugin usage and remove or replace vulnerable plugins where feasible to reduce exposure.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-02-13T14:49:54.659Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d31b7ef31ef0b56ed24
Added to database: 2/25/2026, 9:44:17 PM
Last enriched: 2/26/2026, 9:35:09 AM
Last updated: 2/26/2026, 12:47:04 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14343: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Dokuzsoft Technology Ltd. E-Commerce Product
HighCVE-2026-1198: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Simple SA Simple.ERP
HighCVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.