Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1467: CWE-918 Server-Side Request Forgery (SSRF) in brainstormforce Starter Templates — Elementor, WordPress & Beaver Builder Templates

0
Medium
VulnerabilityCVE-2024-1467cvecve-2024-1467cwe-918
Published: Thu May 09 2024 (05/09/2024, 20:03:39 UTC)
Source: CVE Database V5
Vendor/Project: brainstormforce
Product: Starter Templates — Elementor, WordPress & Beaver Builder Templates

Description

CVE-2024-1467 is a Server-Side Request Forgery (SSRF) vulnerability found in the Starter Templates plugin for WordPress, which supports Elementor, WordPress, and Beaver Builder templates. This vulnerability affects all versions up to and including 4. 1. 6 and allows authenticated users with contributor-level access or higher to make arbitrary web requests from the server. Exploiting this flaw can enable attackers to interact with internal services, potentially querying or modifying sensitive information. The vulnerability does not require user interaction beyond authentication and has a CVSS score of 4. 3, indicating medium severity. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this issue to prevent internal network reconnaissance or data manipulation. The threat primarily impacts WordPress sites using this plugin globally, especially in countries with high WordPress adoption and significant web infrastructure.

AI-Powered Analysis

AILast updated: 02/26/2026, 09:35:09 UTC

Technical Analysis

CVE-2024-1467 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, affecting the Starter Templates plugin for WordPress, which integrates with Elementor, WordPress, and Beaver Builder templates. The vulnerability exists in the ai_api_request() function, which improperly handles web requests initiated by authenticated users with contributor-level permissions or higher. This flaw allows such users to craft requests to arbitrary URLs from the server hosting the WordPress site, potentially accessing internal network resources that are not otherwise exposed externally. Since the plugin versions up to 4.1.6 are affected, any site running these versions is vulnerable. The SSRF can be leveraged to query internal services, potentially exposing sensitive information or enabling further attacks such as internal port scanning, data exfiltration, or modification of internal resources. The vulnerability requires authentication but no additional user interaction, making it exploitable by any user with contributor or higher roles. The CVSS v3.1 score of 4.3 reflects a medium severity, primarily due to the limited privilege requirement and the impact on integrity without direct confidentiality or availability compromise. No public exploits have been reported yet, but the vulnerability's presence in a widely used WordPress plugin makes it a significant concern for website administrators. The lack of an official patch link indicates that mitigation may currently rely on access control and monitoring until an update is released.

Potential Impact

The SSRF vulnerability in the Starter Templates plugin can have several impacts on affected organizations. Attackers with contributor-level access can exploit the vulnerability to make arbitrary HTTP requests from the server, potentially accessing internal services that are not exposed externally. This can lead to unauthorized information disclosure, such as internal API data, metadata services in cloud environments, or other sensitive endpoints. Additionally, attackers might modify internal data or configurations if internal services are writable, impacting data integrity. While the vulnerability does not directly affect availability or confidentiality of external data, it can be a stepping stone for lateral movement within the network or further exploitation. Organizations relying on this plugin for WordPress sites may face increased risk of internal reconnaissance and targeted attacks, especially if contributor roles are assigned to untrusted users. The medium severity score suggests that while the risk is not critical, it is significant enough to warrant prompt attention to prevent exploitation and potential escalation.

Mitigation Recommendations

To mitigate CVE-2024-1467, organizations should take several specific actions beyond generic advice: 1) Immediately audit and restrict contributor-level and higher user roles to trusted personnel only, minimizing the number of users who can exploit the vulnerability. 2) Monitor and log outgoing HTTP requests originating from the WordPress server to detect unusual or unauthorized internal requests indicative of SSRF exploitation. 3) Implement network segmentation and firewall rules to limit the WordPress server's ability to access sensitive internal services or metadata endpoints, reducing the attack surface. 4) Disable or restrict the ai_api_request() functionality if possible, or apply custom patches or workarounds until an official update is released. 5) Stay informed about updates from Brainstormforce and apply patches promptly once available. 6) Consider deploying Web Application Firewalls (WAFs) with rules to detect and block SSRF patterns targeting this plugin. 7) Regularly review plugin usage and remove or replace vulnerable plugins where feasible to reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-02-13T14:49:54.659Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d31b7ef31ef0b56ed24

Added to database: 2/25/2026, 9:44:17 PM

Last enriched: 2/26/2026, 9:35:09 AM

Last updated: 2/26/2026, 12:47:04 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats