Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10735: CWE-918 Server-Side Request Forgery (SSRF) in bplugins Block For Mailchimp – Easy Mailchimp Form Integration

0
Medium
VulnerabilityCVE-2025-10735cvecve-2025-10735cwe-918
Published: Wed Oct 01 2025 (10/01/2025, 03:25:23 UTC)
Source: CVE Database V5
Vendor/Project: bplugins
Product: Block For Mailchimp – Easy Mailchimp Form Integration

Description

The Block For Mailchimp – Easy Mailchimp Form Integration plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 1.1.12 via the mcbSubmit_Form_Data(). This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 18:37:03 UTC

Technical Analysis

CVE-2025-10735 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, found in the 'Block For Mailchimp – Easy Mailchimp Form Integration' WordPress plugin developed by bplugins. The vulnerability affects all versions up to and including 1.1.12 and resides in the mcbSubmit_Form_Data() function. SSRF vulnerabilities allow attackers to abuse the server to send HTTP requests to arbitrary locations, including internal network services that are otherwise inaccessible externally. This particular SSRF is blind, meaning the attacker does not receive direct response data from the targeted internal resource, but can infer success or failure through side effects or indirect responses. The vulnerability is exploitable without authentication or user interaction, but requires a high level of attack complexity, likely due to the need to craft specific requests or conditions. The impact primarily involves the potential to query internal services and modify information, which can lead to limited integrity compromise within the internal network. The CVSS v3.1 score is 4.0 (medium severity) with vector AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N, indicating network attack vector, high complexity, no privileges or user interaction required, scope changed, no confidentiality or availability impact, and limited integrity impact. No patches or known exploits are currently available, emphasizing the need for proactive mitigation. This vulnerability is significant for organizations running WordPress sites with this plugin, especially those with sensitive internal services accessible from the web server.

Potential Impact

The primary impact of CVE-2025-10735 is the potential for attackers to leverage the vulnerable WordPress plugin to perform SSRF attacks, enabling them to send crafted HTTP requests from the web server to arbitrary internal or external systems. This can facilitate internal network reconnaissance, allowing attackers to discover and interact with internal services that are not exposed externally. Although the vulnerability does not directly compromise confidentiality or availability, it can lead to limited integrity issues by modifying information on internal services if such services accept HTTP requests that alter state. The exploitation requires no authentication or user interaction, increasing the attack surface. Organizations with sensitive internal APIs, databases, or management interfaces accessible from the web server are at risk of indirect compromise. The medium CVSS score reflects the complexity and limited direct impact, but the potential for lateral movement or further exploitation within internal networks elevates the threat. The absence of known exploits suggests that attackers have not yet widely weaponized this vulnerability, but it remains a significant risk for WordPress sites using this plugin.

Mitigation Recommendations

1. Immediate mitigation should include disabling or removing the 'Block For Mailchimp – Easy Mailchimp Form Integration' plugin until a security patch is released. 2. Restrict outbound HTTP requests from the web server hosting WordPress to only trusted destinations using firewall rules or web proxy configurations to prevent SSRF exploitation. 3. Implement network segmentation to isolate internal services from the web server, minimizing the impact of SSRF attacks. 4. Monitor web server logs for unusual outbound request patterns or anomalies indicative of SSRF attempts. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable plugin's endpoints, particularly those invoking mcbSubmit_Form_Data(). 6. Once available, promptly apply vendor patches or updates addressing this vulnerability. 7. Conduct internal audits of services accessible from the web server to ensure they are hardened against unauthorized requests. 8. Educate development and security teams about SSRF risks and secure coding practices to prevent similar vulnerabilities in custom plugins or integrations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-19T15:00:10.416Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68dca0d55d588c52e5e0c37d

Added to database: 10/1/2025, 3:32:37 AM

Last enriched: 2/27/2026, 6:37:03 PM

Last updated: 3/25/2026, 12:13:30 AM

Views: 145

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses