CVE-2024-4789: CWE-918 Server-Side Request Forgery (SSRF) in StylemixThemes Cost Calculator Builder PRO
CVE-2024-4789 is a Server-Side Request Forgery (SSRF) vulnerability in the Cost Calculator Builder PRO WordPress plugin by StylemixThemes, affecting all versions up to 3. 1. 72. Authenticated users with subscriber-level access or higher can exploit this flaw via the send_demo_webhook() function to make arbitrary web requests from the server. This can lead to unauthorized querying and modification of internal services, potentially exposing sensitive data or enabling further attacks within the internal network. The vulnerability has a CVSS score of 6. 4 (medium severity), reflecting its moderate impact and ease of exploitation without user interaction. No public exploits are currently known. Organizations using this plugin should prioritize patching or mitigating this issue to prevent internal network compromise. The threat primarily affects websites running WordPress with this plugin installed, which are widespread globally, especially in countries with high WordPress adoption.
AI Analysis
Technical Summary
CVE-2024-4789 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Cost Calculator Builder PRO plugin for WordPress, developed by StylemixThemes. This vulnerability exists in all versions up to 3.1.72 and is triggered via the send_demo_webhook() function. SSRF vulnerabilities allow an attacker to abuse a server-side component to send HTTP requests to arbitrary domains or IP addresses, including internal network resources that are otherwise inaccessible externally. In this case, an authenticated attacker with subscriber-level privileges or higher can exploit the vulnerability without requiring additional user interaction. By leveraging this flaw, attackers can make the web application initiate requests to internal services, potentially leading to unauthorized information disclosure or modification of internal data. The vulnerability is rated with a CVSS 3.1 base score of 6.4, indicating a medium severity level. The vector metrics highlight that the attack can be performed remotely over the network (AV:N), requires low attack complexity (AC:L), needs privileges (PR:L), but no user interaction (UI:N), and impacts confidentiality and integrity with a scope change (S:C). No public exploits or patches are currently available, emphasizing the need for proactive mitigation. The vulnerability affects a popular WordPress plugin used globally, making it a relevant concern for many organizations relying on WordPress for their web presence.
Potential Impact
The SSRF vulnerability in Cost Calculator Builder PRO can have significant impacts on organizations running vulnerable WordPress sites. Attackers with minimal privileges (subscriber-level) can exploit this flaw to send arbitrary HTTP requests from the web server to internal or external systems. This can lead to unauthorized access to internal services, potentially exposing sensitive information such as internal APIs, metadata services, or administrative interfaces not intended for public access. The ability to modify internal data via these requests can further escalate the impact, enabling attackers to alter configurations or inject malicious payloads. While the vulnerability does not directly affect availability, the compromise of confidentiality and integrity can lead to data breaches, lateral movement within internal networks, and ultimately full system compromise. Organizations relying on this plugin may face reputational damage, regulatory penalties, and operational disruptions if exploited. The medium CVSS score reflects the moderate but tangible risk, especially given the low privilege required and the widespread use of WordPress and this plugin.
Mitigation Recommendations
To mitigate CVE-2024-4789, organizations should take the following specific actions: 1) Immediately identify and inventory all WordPress installations using the Cost Calculator Builder PRO plugin and determine their versions. 2) Apply any available patches or updates from StylemixThemes as soon as they are released. In the absence of official patches, consider temporarily disabling or uninstalling the plugin to eliminate the attack surface. 3) Restrict user privileges rigorously; limit subscriber-level accounts and review user roles to minimize the number of users who can exploit this vulnerability. 4) Implement network segmentation and firewall rules to restrict outbound HTTP requests from web servers, preventing unauthorized internal network access via SSRF. 5) Monitor web server logs and network traffic for unusual outbound requests, especially those targeting internal IP ranges or sensitive endpoints. 6) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests to the vulnerable function. 7) Educate administrators and developers about SSRF risks and encourage secure coding practices to prevent similar vulnerabilities. These targeted measures go beyond generic advice by focusing on controlling the specific attack vector and limiting the potential for internal network exploitation.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Netherlands, Japan, Italy, Spain
CVE-2024-4789: CWE-918 Server-Side Request Forgery (SSRF) in StylemixThemes Cost Calculator Builder PRO
Description
CVE-2024-4789 is a Server-Side Request Forgery (SSRF) vulnerability in the Cost Calculator Builder PRO WordPress plugin by StylemixThemes, affecting all versions up to 3. 1. 72. Authenticated users with subscriber-level access or higher can exploit this flaw via the send_demo_webhook() function to make arbitrary web requests from the server. This can lead to unauthorized querying and modification of internal services, potentially exposing sensitive data or enabling further attacks within the internal network. The vulnerability has a CVSS score of 6. 4 (medium severity), reflecting its moderate impact and ease of exploitation without user interaction. No public exploits are currently known. Organizations using this plugin should prioritize patching or mitigating this issue to prevent internal network compromise. The threat primarily affects websites running WordPress with this plugin installed, which are widespread globally, especially in countries with high WordPress adoption.
AI-Powered Analysis
Technical Analysis
CVE-2024-4789 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Cost Calculator Builder PRO plugin for WordPress, developed by StylemixThemes. This vulnerability exists in all versions up to 3.1.72 and is triggered via the send_demo_webhook() function. SSRF vulnerabilities allow an attacker to abuse a server-side component to send HTTP requests to arbitrary domains or IP addresses, including internal network resources that are otherwise inaccessible externally. In this case, an authenticated attacker with subscriber-level privileges or higher can exploit the vulnerability without requiring additional user interaction. By leveraging this flaw, attackers can make the web application initiate requests to internal services, potentially leading to unauthorized information disclosure or modification of internal data. The vulnerability is rated with a CVSS 3.1 base score of 6.4, indicating a medium severity level. The vector metrics highlight that the attack can be performed remotely over the network (AV:N), requires low attack complexity (AC:L), needs privileges (PR:L), but no user interaction (UI:N), and impacts confidentiality and integrity with a scope change (S:C). No public exploits or patches are currently available, emphasizing the need for proactive mitigation. The vulnerability affects a popular WordPress plugin used globally, making it a relevant concern for many organizations relying on WordPress for their web presence.
Potential Impact
The SSRF vulnerability in Cost Calculator Builder PRO can have significant impacts on organizations running vulnerable WordPress sites. Attackers with minimal privileges (subscriber-level) can exploit this flaw to send arbitrary HTTP requests from the web server to internal or external systems. This can lead to unauthorized access to internal services, potentially exposing sensitive information such as internal APIs, metadata services, or administrative interfaces not intended for public access. The ability to modify internal data via these requests can further escalate the impact, enabling attackers to alter configurations or inject malicious payloads. While the vulnerability does not directly affect availability, the compromise of confidentiality and integrity can lead to data breaches, lateral movement within internal networks, and ultimately full system compromise. Organizations relying on this plugin may face reputational damage, regulatory penalties, and operational disruptions if exploited. The medium CVSS score reflects the moderate but tangible risk, especially given the low privilege required and the widespread use of WordPress and this plugin.
Mitigation Recommendations
To mitigate CVE-2024-4789, organizations should take the following specific actions: 1) Immediately identify and inventory all WordPress installations using the Cost Calculator Builder PRO plugin and determine their versions. 2) Apply any available patches or updates from StylemixThemes as soon as they are released. In the absence of official patches, consider temporarily disabling or uninstalling the plugin to eliminate the attack surface. 3) Restrict user privileges rigorously; limit subscriber-level accounts and review user roles to minimize the number of users who can exploit this vulnerability. 4) Implement network segmentation and firewall rules to restrict outbound HTTP requests from web servers, preventing unauthorized internal network access via SSRF. 5) Monitor web server logs and network traffic for unusual outbound requests, especially those targeting internal IP ranges or sensitive endpoints. 6) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests to the vulnerable function. 7) Educate administrators and developers about SSRF risks and encourage secure coding practices to prevent similar vulnerabilities. These targeted measures go beyond generic advice by focusing on controlling the specific attack vector and limiting the potential for internal network exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-05-10T22:31:12.612Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b96b7ef31ef0b556f33
Added to database: 2/25/2026, 9:37:26 PM
Last enriched: 2/26/2026, 12:55:19 AM
Last updated: 2/26/2026, 6:11:27 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.