CVE-2025-10874: CWE-918 Server-Side Request Forgery (SSRF) in Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More
The Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More WordPress plugin before 3.0.2 does not limit URLs which may be used for the stock photo import feature, allowing the user to specify arbitrary URLs. This leads to a server-side request forgery as the user may force the server to access any URL of their choosing.
AI Analysis
Technical Summary
CVE-2025-10874 is a Server-Side Request Forgery (SSRF) vulnerability identified in the WordPress plugin 'Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More' prior to version 3.0.2. The vulnerability stems from the plugin's stock photo import feature, which fails to properly restrict or validate the URLs that can be specified by users. Authenticated users with high privileges can exploit this flaw by submitting arbitrary URLs, causing the server to initiate HTTP requests to those URLs. This SSRF can be leveraged to access internal resources, potentially bypassing firewall restrictions or accessing sensitive internal services that are not exposed externally. The vulnerability impacts confidentiality and integrity, as attackers may retrieve sensitive data or manipulate internal services indirectly. The CVSS v3.1 score is 5.5 (medium severity), reflecting network attack vector, low attack complexity, requirement for high privileges, no user interaction, and a scope change. No public exploits have been reported yet, but the vulnerability is published and should be addressed promptly. The plugin is widely used in WordPress environments for enhancing site functionality, making this a relevant concern for WordPress-based websites.
Potential Impact
For European organizations, the impact of this SSRF vulnerability can be significant, especially for those relying on WordPress sites with the Orbit Fox plugin installed. Attackers with authenticated access can exploit the vulnerability to make the server perform unauthorized requests, potentially accessing internal network resources, cloud metadata services, or other sensitive endpoints. This can lead to data leakage, unauthorized internal reconnaissance, and possibly further exploitation if internal services are vulnerable. The integrity of internal systems could be compromised if attackers manipulate internal services via SSRF. Although the vulnerability does not directly cause denial of service, the indirect effects on confidentiality and integrity pose a moderate risk. Organizations handling sensitive or regulated data (e.g., GDPR-protected personal data) may face compliance issues if internal data is exposed. The requirement for high privileges limits the attack surface but does not eliminate risk, especially in environments with multiple administrators or compromised credentials.
Mitigation Recommendations
European organizations should immediately update the Orbit Fox plugin to version 3.0.2 or later, where the vulnerability is patched. Until the update is applied, restrict access to the WordPress admin interface to trusted users only and enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. Network-level mitigations include implementing egress filtering on web servers hosting WordPress to restrict outbound HTTP requests to only trusted domains, preventing SSRF exploitation from reaching internal services or external malicious endpoints. Additionally, monitor logs for unusual outbound requests originating from the WordPress server, especially to internal IP ranges or unexpected external URLs. Conduct regular audits of installed plugins and their versions to ensure timely patching. Finally, consider deploying Web Application Firewalls (WAFs) with SSRF detection capabilities to provide an additional layer of defense.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-10874: CWE-918 Server-Side Request Forgery (SSRF) in Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More
Description
The Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More WordPress plugin before 3.0.2 does not limit URLs which may be used for the stock photo import feature, allowing the user to specify arbitrary URLs. This leads to a server-side request forgery as the user may force the server to access any URL of their choosing.
AI-Powered Analysis
Technical Analysis
CVE-2025-10874 is a Server-Side Request Forgery (SSRF) vulnerability identified in the WordPress plugin 'Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More' prior to version 3.0.2. The vulnerability stems from the plugin's stock photo import feature, which fails to properly restrict or validate the URLs that can be specified by users. Authenticated users with high privileges can exploit this flaw by submitting arbitrary URLs, causing the server to initiate HTTP requests to those URLs. This SSRF can be leveraged to access internal resources, potentially bypassing firewall restrictions or accessing sensitive internal services that are not exposed externally. The vulnerability impacts confidentiality and integrity, as attackers may retrieve sensitive data or manipulate internal services indirectly. The CVSS v3.1 score is 5.5 (medium severity), reflecting network attack vector, low attack complexity, requirement for high privileges, no user interaction, and a scope change. No public exploits have been reported yet, but the vulnerability is published and should be addressed promptly. The plugin is widely used in WordPress environments for enhancing site functionality, making this a relevant concern for WordPress-based websites.
Potential Impact
For European organizations, the impact of this SSRF vulnerability can be significant, especially for those relying on WordPress sites with the Orbit Fox plugin installed. Attackers with authenticated access can exploit the vulnerability to make the server perform unauthorized requests, potentially accessing internal network resources, cloud metadata services, or other sensitive endpoints. This can lead to data leakage, unauthorized internal reconnaissance, and possibly further exploitation if internal services are vulnerable. The integrity of internal systems could be compromised if attackers manipulate internal services via SSRF. Although the vulnerability does not directly cause denial of service, the indirect effects on confidentiality and integrity pose a moderate risk. Organizations handling sensitive or regulated data (e.g., GDPR-protected personal data) may face compliance issues if internal data is exposed. The requirement for high privileges limits the attack surface but does not eliminate risk, especially in environments with multiple administrators or compromised credentials.
Mitigation Recommendations
European organizations should immediately update the Orbit Fox plugin to version 3.0.2 or later, where the vulnerability is patched. Until the update is applied, restrict access to the WordPress admin interface to trusted users only and enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. Network-level mitigations include implementing egress filtering on web servers hosting WordPress to restrict outbound HTTP requests to only trusted domains, preventing SSRF exploitation from reaching internal services or external malicious endpoints. Additionally, monitor logs for unusual outbound requests originating from the WordPress server, especially to internal IP ranges or unexpected external URLs. Conduct regular audits of installed plugins and their versions to ensure timely patching. Finally, consider deploying Web Application Firewalls (WAFs) with SSRF detection capabilities to provide an additional layer of defense.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2025-09-23T12:43:21.589Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68fb1ac81658c9c3946ecbc6
Added to database: 10/24/2025, 6:20:56 AM
Last enriched: 1/9/2026, 8:48:29 PM
Last updated: 2/7/2026, 3:22:22 PM
Views: 200
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighOrganizations Urged to Replace Discontinued Edge Devices
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.