CVE-2025-10874: CWE-918 Server-Side Request Forgery (SSRF) in Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More
The Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More WordPress plugin before 3.0.2 does not limit URLs which may be used for the stock photo import feature, allowing the user to specify arbitrary URLs. This leads to a server-side request forgery as the user may force the server to access any URL of their choosing.
AI Analysis
Technical Summary
CVE-2025-10874 is a Server-Side Request Forgery (SSRF) vulnerability identified in the WordPress plugin 'Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More' prior to version 3.0.2. The vulnerability arises because the plugin's stock photo import feature does not properly restrict the URLs that can be specified by users. Authenticated users with high privileges can exploit this by providing arbitrary URLs, causing the server to initiate HTTP requests to those URLs. SSRF vulnerabilities can be leveraged by attackers to access internal resources that are not otherwise exposed externally, potentially leading to information disclosure, internal network reconnaissance, or interaction with internal services. The CVSS score of 5.5 (medium severity) reflects that the attack vector is network-based, requires high privileges, does not require user interaction, and impacts confidentiality and integrity but not availability. No known public exploits have been reported, but the vulnerability is published and should be addressed promptly. The plugin is widely used in WordPress environments, which are common in many organizations, including those in Europe. The vulnerability's exploitation requires authenticated access with elevated privileges, which somewhat limits the attack surface but still poses a significant risk if an attacker compromises or impersonates a privileged user.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized internal network reconnaissance and potential leakage of sensitive information accessible from the server's network environment. Attackers exploiting this SSRF could pivot to other internal systems, bypass firewall restrictions, or access metadata services in cloud environments, which could compromise confidentiality and integrity of data. Since WordPress is widely used across Europe for corporate websites, intranets, and e-commerce platforms, organizations relying on the vulnerable plugin risk exposure to targeted attacks, especially if privileged accounts are compromised. The impact is particularly relevant for organizations with sensitive internal networks or cloud infrastructure accessible from the WordPress server. While availability is not directly affected, the breach of confidentiality and integrity could lead to further attacks, data breaches, or regulatory compliance issues under GDPR.
Mitigation Recommendations
1. Immediately update the Orbit Fox plugin to version 3.0.2 or later where the vulnerability is fixed. 2. Restrict plugin usage and administrative access to trusted users only, enforcing strong authentication and role-based access control to minimize the risk of privilege abuse. 3. Implement network-level egress filtering to restrict outbound HTTP requests from WordPress servers to only trusted destinations, preventing SSRF exploitation from reaching internal resources. 4. Monitor logs for unusual outbound HTTP requests initiated by the WordPress server, especially to internal IP ranges or unexpected external addresses. 5. Employ Web Application Firewalls (WAFs) with rules to detect and block SSRF patterns related to the plugin's stock photo import feature. 6. Conduct regular security audits and vulnerability scans on WordPress environments to detect outdated plugins and misconfigurations. 7. Educate administrators about the risks of SSRF and the importance of limiting plugin privileges and access.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-10874: CWE-918 Server-Side Request Forgery (SSRF) in Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More
Description
The Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More WordPress plugin before 3.0.2 does not limit URLs which may be used for the stock photo import feature, allowing the user to specify arbitrary URLs. This leads to a server-side request forgery as the user may force the server to access any URL of their choosing.
AI-Powered Analysis
Technical Analysis
CVE-2025-10874 is a Server-Side Request Forgery (SSRF) vulnerability identified in the WordPress plugin 'Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More' prior to version 3.0.2. The vulnerability arises because the plugin's stock photo import feature does not properly restrict the URLs that can be specified by users. Authenticated users with high privileges can exploit this by providing arbitrary URLs, causing the server to initiate HTTP requests to those URLs. SSRF vulnerabilities can be leveraged by attackers to access internal resources that are not otherwise exposed externally, potentially leading to information disclosure, internal network reconnaissance, or interaction with internal services. The CVSS score of 5.5 (medium severity) reflects that the attack vector is network-based, requires high privileges, does not require user interaction, and impacts confidentiality and integrity but not availability. No known public exploits have been reported, but the vulnerability is published and should be addressed promptly. The plugin is widely used in WordPress environments, which are common in many organizations, including those in Europe. The vulnerability's exploitation requires authenticated access with elevated privileges, which somewhat limits the attack surface but still poses a significant risk if an attacker compromises or impersonates a privileged user.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized internal network reconnaissance and potential leakage of sensitive information accessible from the server's network environment. Attackers exploiting this SSRF could pivot to other internal systems, bypass firewall restrictions, or access metadata services in cloud environments, which could compromise confidentiality and integrity of data. Since WordPress is widely used across Europe for corporate websites, intranets, and e-commerce platforms, organizations relying on the vulnerable plugin risk exposure to targeted attacks, especially if privileged accounts are compromised. The impact is particularly relevant for organizations with sensitive internal networks or cloud infrastructure accessible from the WordPress server. While availability is not directly affected, the breach of confidentiality and integrity could lead to further attacks, data breaches, or regulatory compliance issues under GDPR.
Mitigation Recommendations
1. Immediately update the Orbit Fox plugin to version 3.0.2 or later where the vulnerability is fixed. 2. Restrict plugin usage and administrative access to trusted users only, enforcing strong authentication and role-based access control to minimize the risk of privilege abuse. 3. Implement network-level egress filtering to restrict outbound HTTP requests from WordPress servers to only trusted destinations, preventing SSRF exploitation from reaching internal resources. 4. Monitor logs for unusual outbound HTTP requests initiated by the WordPress server, especially to internal IP ranges or unexpected external addresses. 5. Employ Web Application Firewalls (WAFs) with rules to detect and block SSRF patterns related to the plugin's stock photo import feature. 6. Conduct regular security audits and vulnerability scans on WordPress environments to detect outdated plugins and misconfigurations. 7. Educate administrators about the risks of SSRF and the importance of limiting plugin privileges and access.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2025-09-23T12:43:21.589Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68fb1ac81658c9c3946ecbc6
Added to database: 10/24/2025, 6:20:56 AM
Last enriched: 10/31/2025, 7:36:08 AM
Last updated: 12/8/2025, 12:14:58 AM
Views: 161
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14205: Cross Site Scripting in code-projects Chamber of Commerce Membership Management System
MediumCVE-2025-14204: OS Command Injection in TykoDev cherry-studio-TykoFork
MediumCVE-2025-14203: SQL Injection in code-projects Question Paper Generator
MediumCVE-2025-14201: Cross Site Scripting in alokjaiswal Hotel-Management-services-using-MYSQL-and-php
MediumCVE-2025-14200: Cross Site Scripting in alokjaiswal Hotel-Management-services-using-MYSQL-and-php
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.