CVE-2025-10056: CWE-918 Server-Side Request Forgery (SSRF) in miunosoft Task Scheduler
The Task Scheduler plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.6.3 via the “Check Website” task. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
AI Analysis
Technical Summary
CVE-2025-10056 is a Server-Side Request Forgery (SSRF) vulnerability identified in the miunosoft Task Scheduler plugin for WordPress, affecting all versions up to and including 1.6.3. The vulnerability arises from the “Check Website” task functionality, which allows authenticated users with Administrator-level privileges to trigger web requests from the server to arbitrary URLs. SSRF vulnerabilities enable attackers to abuse the server as a proxy to interact with internal or external systems that may be otherwise inaccessible, potentially exposing sensitive internal resources or enabling further attacks. In this case, the attacker must have administrator-level access, which limits the initial attack vector but still poses a significant risk if such credentials are compromised or misused. The vulnerability can be used to query internal services, potentially revealing sensitive information or modifying data within internal networks. The CVSS 3.1 base score is 4.4 (medium severity), reflecting the need for high privileges (PR:H), high attack complexity (AC:H), no user interaction (UI:N), and partial confidentiality and integrity impacts (C:L/I:L/A:N). No public exploits have been reported yet, but the vulnerability is published and should be addressed promptly. The plugin is widely used in WordPress environments, which are common globally, making this a relevant threat for many organizations. The lack of a patch link indicates that a fix may not yet be available, emphasizing the need for interim mitigations.
Potential Impact
The primary impact of CVE-2025-10056 is the potential for attackers with administrator access to perform SSRF attacks, allowing them to send arbitrary HTTP requests from the vulnerable server. This can lead to unauthorized access to internal services that are not exposed externally, such as internal APIs, databases, or cloud metadata services. Attackers could leverage this to gather sensitive information, perform reconnaissance, or manipulate internal systems, potentially escalating their privileges or moving laterally within the network. Although the vulnerability requires administrator privileges, compromised admin accounts are common attack vectors, especially in WordPress environments. The integrity and confidentiality of internal data are at risk, but availability impact is minimal. Organizations relying on this plugin may face data breaches, unauthorized internal access, or disruption of internal services if exploited. The medium severity score reflects these factors, but the real-world impact could be higher in environments with sensitive internal resources accessible via SSRF.
Mitigation Recommendations
1. Immediately restrict administrator access to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Monitor and audit administrator activities within WordPress to detect suspicious behavior that could indicate exploitation attempts. 3. Implement network segmentation and firewall rules to limit the WordPress server’s ability to access sensitive internal services or metadata endpoints, reducing the SSRF attack surface. 4. Disable or restrict the “Check Website” task functionality in the Task Scheduler plugin if possible until a patch is released. 5. Keep the Task Scheduler plugin updated and apply security patches promptly once available. 6. Use web application firewalls (WAFs) with custom rules to detect and block unusual outbound requests originating from the WordPress server. 7. Conduct regular vulnerability assessments and penetration testing focusing on SSRF and privilege abuse scenarios in WordPress environments. 8. Educate administrators about the risks of SSRF and the importance of safeguarding their credentials.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2025-10056: CWE-918 Server-Side Request Forgery (SSRF) in miunosoft Task Scheduler
Description
The Task Scheduler plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.6.3 via the “Check Website” task. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-10056 is a Server-Side Request Forgery (SSRF) vulnerability identified in the miunosoft Task Scheduler plugin for WordPress, affecting all versions up to and including 1.6.3. The vulnerability arises from the “Check Website” task functionality, which allows authenticated users with Administrator-level privileges to trigger web requests from the server to arbitrary URLs. SSRF vulnerabilities enable attackers to abuse the server as a proxy to interact with internal or external systems that may be otherwise inaccessible, potentially exposing sensitive internal resources or enabling further attacks. In this case, the attacker must have administrator-level access, which limits the initial attack vector but still poses a significant risk if such credentials are compromised or misused. The vulnerability can be used to query internal services, potentially revealing sensitive information or modifying data within internal networks. The CVSS 3.1 base score is 4.4 (medium severity), reflecting the need for high privileges (PR:H), high attack complexity (AC:H), no user interaction (UI:N), and partial confidentiality and integrity impacts (C:L/I:L/A:N). No public exploits have been reported yet, but the vulnerability is published and should be addressed promptly. The plugin is widely used in WordPress environments, which are common globally, making this a relevant threat for many organizations. The lack of a patch link indicates that a fix may not yet be available, emphasizing the need for interim mitigations.
Potential Impact
The primary impact of CVE-2025-10056 is the potential for attackers with administrator access to perform SSRF attacks, allowing them to send arbitrary HTTP requests from the vulnerable server. This can lead to unauthorized access to internal services that are not exposed externally, such as internal APIs, databases, or cloud metadata services. Attackers could leverage this to gather sensitive information, perform reconnaissance, or manipulate internal systems, potentially escalating their privileges or moving laterally within the network. Although the vulnerability requires administrator privileges, compromised admin accounts are common attack vectors, especially in WordPress environments. The integrity and confidentiality of internal data are at risk, but availability impact is minimal. Organizations relying on this plugin may face data breaches, unauthorized internal access, or disruption of internal services if exploited. The medium severity score reflects these factors, but the real-world impact could be higher in environments with sensitive internal resources accessible via SSRF.
Mitigation Recommendations
1. Immediately restrict administrator access to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Monitor and audit administrator activities within WordPress to detect suspicious behavior that could indicate exploitation attempts. 3. Implement network segmentation and firewall rules to limit the WordPress server’s ability to access sensitive internal services or metadata endpoints, reducing the SSRF attack surface. 4. Disable or restrict the “Check Website” task functionality in the Task Scheduler plugin if possible until a patch is released. 5. Keep the Task Scheduler plugin updated and apply security patches promptly once available. 6. Use web application firewalls (WAFs) with custom rules to detect and block unusual outbound requests originating from the WordPress server. 7. Conduct regular vulnerability assessments and penetration testing focusing on SSRF and privilege abuse scenarios in WordPress environments. 8. Educate administrators about the risks of SSRF and the importance of safeguarding their credentials.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-05T19:29:56.719Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ef5c7bc4f69c9730e56940
Added to database: 10/15/2025, 8:34:03 AM
Last enriched: 2/27/2026, 6:05:21 PM
Last updated: 3/21/2026, 5:02:35 PM
Views: 148
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.