Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10874: CWE-918 Server-Side Request Forgery (SSRF) in Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More

0
Medium
VulnerabilityCVE-2025-10874cvecve-2025-10874cwe-918
Published: Fri Oct 24 2025 (10/24/2025, 06:00:09 UTC)
Source: CVE Database V5
Product: Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More

Description

The Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More WordPress plugin before 3.0.2 does not limit URLs which may be used for the stock photo import feature, allowing the user to specify arbitrary URLs. This leads to a server-side request forgery as the user may force the server to access any URL of their choosing.

AI-Powered Analysis

AILast updated: 10/31/2025, 07:36:08 UTC

Technical Analysis

CVE-2025-10874 is a Server-Side Request Forgery (SSRF) vulnerability identified in the WordPress plugin 'Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More' prior to version 3.0.2. The vulnerability arises because the plugin's stock photo import feature does not properly restrict the URLs that can be specified by users. Authenticated users with high privileges can exploit this by providing arbitrary URLs, causing the server to initiate HTTP requests to those URLs. SSRF vulnerabilities can be leveraged by attackers to access internal resources that are not otherwise exposed externally, potentially leading to information disclosure, internal network reconnaissance, or interaction with internal services. The CVSS score of 5.5 (medium severity) reflects that the attack vector is network-based, requires high privileges, does not require user interaction, and impacts confidentiality and integrity but not availability. No known public exploits have been reported, but the vulnerability is published and should be addressed promptly. The plugin is widely used in WordPress environments, which are common in many organizations, including those in Europe. The vulnerability's exploitation requires authenticated access with elevated privileges, which somewhat limits the attack surface but still poses a significant risk if an attacker compromises or impersonates a privileged user.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized internal network reconnaissance and potential leakage of sensitive information accessible from the server's network environment. Attackers exploiting this SSRF could pivot to other internal systems, bypass firewall restrictions, or access metadata services in cloud environments, which could compromise confidentiality and integrity of data. Since WordPress is widely used across Europe for corporate websites, intranets, and e-commerce platforms, organizations relying on the vulnerable plugin risk exposure to targeted attacks, especially if privileged accounts are compromised. The impact is particularly relevant for organizations with sensitive internal networks or cloud infrastructure accessible from the WordPress server. While availability is not directly affected, the breach of confidentiality and integrity could lead to further attacks, data breaches, or regulatory compliance issues under GDPR.

Mitigation Recommendations

1. Immediately update the Orbit Fox plugin to version 3.0.2 or later where the vulnerability is fixed. 2. Restrict plugin usage and administrative access to trusted users only, enforcing strong authentication and role-based access control to minimize the risk of privilege abuse. 3. Implement network-level egress filtering to restrict outbound HTTP requests from WordPress servers to only trusted destinations, preventing SSRF exploitation from reaching internal resources. 4. Monitor logs for unusual outbound HTTP requests initiated by the WordPress server, especially to internal IP ranges or unexpected external addresses. 5. Employ Web Application Firewalls (WAFs) with rules to detect and block SSRF patterns related to the plugin's stock photo import feature. 6. Conduct regular security audits and vulnerability scans on WordPress environments to detect outdated plugins and misconfigurations. 7. Educate administrators about the risks of SSRF and the importance of limiting plugin privileges and access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2025-09-23T12:43:21.589Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68fb1ac81658c9c3946ecbc6

Added to database: 10/24/2025, 6:20:56 AM

Last enriched: 10/31/2025, 7:36:08 AM

Last updated: 12/8/2025, 12:14:58 AM

Views: 161

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats