Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10705: CWE-918 Server-Side Request Forgery (SSRF) in mxchat MxChat – AI Chatbot for WordPress

0
Medium
VulnerabilityCVE-2025-10705cvecve-2025-10705cwe-918
Published: Thu Oct 23 2025 (10/23/2025, 12:32:32 UTC)
Source: CVE Database V5
Vendor/Project: mxchat
Product: MxChat – AI Chatbot for WordPress

Description

The MxChat – AI Chatbot for WordPress plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 2.4.6. This is due to insufficient validation of user-supplied URLs in the PDF processing functionality. This makes it possible for unauthenticated attackers to make the WordPress server perform HTTP requests to arbitrary destinations via the mxchat_handle_chat_request AJAX action.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 18:35:27 UTC

Technical Analysis

CVE-2025-10705 is a Blind Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, found in the MxChat – AI Chatbot for WordPress plugin versions up to and including 2.4.6. The vulnerability stems from inadequate validation of user-supplied URLs within the plugin's PDF processing feature. Specifically, the plugin exposes an AJAX action named mxchat_handle_chat_request that accepts URLs from unauthenticated users without proper sanitization or validation. This flaw enables attackers to coerce the WordPress server into making HTTP requests to arbitrary internal or external destinations, effectively allowing them to probe internal networks or access resources not directly reachable from the attacker’s location. The SSRF is blind, meaning attackers do not receive direct responses from the targeted resource but can infer information based on server behavior or timing. The vulnerability does not require any authentication or user interaction, increasing its exploitability. However, the impact is limited to confidentiality loss, as the vulnerability does not allow modification of data or disruption of service. No patches or official fixes are currently linked, and no active exploitation has been reported. The CVSS v3.1 base score is 5.3, indicating medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), and no integrity or availability impact (I:N/A:N).

Potential Impact

The primary impact of this SSRF vulnerability is unauthorized information disclosure. Attackers can leverage the vulnerability to make the WordPress server send HTTP requests to internal or external systems, potentially accessing sensitive internal services, metadata endpoints, or other protected resources that are not directly accessible externally. This can facilitate further attacks such as internal network reconnaissance, bypassing firewalls, or gathering intelligence for subsequent exploitation. Since the vulnerability does not affect integrity or availability, it does not allow attackers to modify data or cause denial of service directly. However, the ability to perform SSRF can be a stepping stone for more complex attacks, especially in environments where internal services trust the WordPress server. Organizations running the vulnerable plugin risk exposure of internal network topology and sensitive data accessible via HTTP endpoints. The lack of authentication requirement and user interaction makes the attack easier to execute at scale. Although no known exploits are currently reported, the widespread use of WordPress and AI chatbot plugins increases the potential attack surface globally.

Mitigation Recommendations

1. Immediate mitigation should involve disabling or restricting access to the mxchat_handle_chat_request AJAX action if possible, especially from unauthenticated users. 2. Implement strict input validation and sanitization on all user-supplied URLs, ensuring only trusted or whitelisted domains can be requested. 3. Employ network-level controls such as firewall rules or web application firewalls (WAFs) to block outbound HTTP requests from the WordPress server to internal or sensitive IP ranges. 4. Monitor server logs for unusual outbound HTTP requests initiated by the WordPress server, particularly those triggered by the chatbot plugin. 5. Update the MxChat plugin to a patched version once available; if no patch exists, consider temporarily disabling the plugin or replacing it with a secure alternative. 6. Conduct internal network segmentation to limit the WordPress server’s ability to reach critical internal services. 7. Educate administrators on the risks of SSRF and encourage regular vulnerability scanning and plugin audits. These steps go beyond generic advice by focusing on both application-level fixes and network-level defenses tailored to SSRF threats.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-18T23:17:38.240Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fa270860d00e69dc99f587

Added to database: 10/23/2025, 1:00:56 PM

Last enriched: 2/27/2026, 6:35:27 PM

Last updated: 3/28/2026, 10:50:48 AM

Views: 242

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses