CVE-2025-11361: CWE-918 Server-Side Request Forgery (SSRF) in wpdevteam Gutenberg Essential Blocks – Page Builder for Gutenberg Blocks & Patterns
The Gutenberg Essential Blocks – Page Builder for Gutenberg Blocks & Patterns plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.7.1 via the eb_save_ai_generated_image function. This makes it possible for authenticated attackers, with Author-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
AI Analysis
Technical Summary
CVE-2025-11361 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, found in the Gutenberg Essential Blocks – Page Builder for Gutenberg Blocks & Patterns WordPress plugin, versions up to and including 5.7.1. The vulnerability resides in the eb_save_ai_generated_image function, which processes requests to save AI-generated images. Authenticated attackers with Author-level or higher privileges can exploit this flaw to make arbitrary HTTP requests originating from the vulnerable web server. This capability allows attackers to interact with internal network services that are otherwise inaccessible externally, potentially leading to unauthorized data access or manipulation. The vulnerability has a CVSS 3.1 base score of 6.4, reflecting medium severity, with an attack vector of network, low attack complexity, requiring privileges but no user interaction, and impacts confidentiality and integrity with no effect on availability. No public exploits have been reported yet, but the risk remains significant due to the potential for internal network reconnaissance and lateral movement. The plugin is widely used in WordPress environments, which are prevalent globally, increasing the scope of affected systems. The vulnerability's exploitation requires authenticated access, limiting exposure to users with some level of trust, but the impact on internal services can be substantial if exploited. No official patches were listed at the time of publication, so mitigation relies on access control and monitoring until updates are released.
Potential Impact
The SSRF vulnerability allows attackers with Author-level access to leverage the web server as a proxy to send arbitrary requests to internal or external systems. This can lead to unauthorized access to sensitive internal services, such as databases, metadata services in cloud environments, or internal APIs, potentially exposing confidential information or enabling further exploitation. The ability to modify information via these requests can compromise data integrity within internal systems. Although availability is not directly impacted, the breach of confidentiality and integrity can have severe consequences, including data leakage, privilege escalation, and lateral movement within the network. Organizations running WordPress sites with this plugin are at risk, especially if they allow Author-level user registrations or have compromised user accounts. The medium severity score reflects the balance between required privileges and the potential damage. The absence of known exploits reduces immediate risk but does not eliminate it, as attackers may develop exploits. The vulnerability could be leveraged in targeted attacks against organizations with sensitive internal services accessible only from the web server, making it a significant threat to data security and internal network integrity.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first restrict Author-level and higher privileges to trusted users only, minimizing the risk of exploitation by malicious insiders or compromised accounts. Implement strict user access controls and monitor user activities for suspicious behavior. Network segmentation should be employed to limit the web server's ability to reach sensitive internal services, reducing the impact of SSRF attacks. Web application firewalls (WAFs) can be configured to detect and block unusual outbound requests originating from the web server. Until an official patch is released, consider disabling or removing the Gutenberg Essential Blocks plugin if feasible, or restrict its usage to environments where risk is minimal. Regularly monitor security advisories from the plugin vendor and WordPress community for updates or patches. Additionally, conduct internal audits of logs to detect anomalous request patterns indicative of SSRF exploitation attempts. Employing runtime application self-protection (RASP) solutions can also help detect and prevent SSRF attacks in real-time.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan, South Korea, Italy
CVE-2025-11361: CWE-918 Server-Side Request Forgery (SSRF) in wpdevteam Gutenberg Essential Blocks – Page Builder for Gutenberg Blocks & Patterns
Description
The Gutenberg Essential Blocks – Page Builder for Gutenberg Blocks & Patterns plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.7.1 via the eb_save_ai_generated_image function. This makes it possible for authenticated attackers, with Author-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-11361 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, found in the Gutenberg Essential Blocks – Page Builder for Gutenberg Blocks & Patterns WordPress plugin, versions up to and including 5.7.1. The vulnerability resides in the eb_save_ai_generated_image function, which processes requests to save AI-generated images. Authenticated attackers with Author-level or higher privileges can exploit this flaw to make arbitrary HTTP requests originating from the vulnerable web server. This capability allows attackers to interact with internal network services that are otherwise inaccessible externally, potentially leading to unauthorized data access or manipulation. The vulnerability has a CVSS 3.1 base score of 6.4, reflecting medium severity, with an attack vector of network, low attack complexity, requiring privileges but no user interaction, and impacts confidentiality and integrity with no effect on availability. No public exploits have been reported yet, but the risk remains significant due to the potential for internal network reconnaissance and lateral movement. The plugin is widely used in WordPress environments, which are prevalent globally, increasing the scope of affected systems. The vulnerability's exploitation requires authenticated access, limiting exposure to users with some level of trust, but the impact on internal services can be substantial if exploited. No official patches were listed at the time of publication, so mitigation relies on access control and monitoring until updates are released.
Potential Impact
The SSRF vulnerability allows attackers with Author-level access to leverage the web server as a proxy to send arbitrary requests to internal or external systems. This can lead to unauthorized access to sensitive internal services, such as databases, metadata services in cloud environments, or internal APIs, potentially exposing confidential information or enabling further exploitation. The ability to modify information via these requests can compromise data integrity within internal systems. Although availability is not directly impacted, the breach of confidentiality and integrity can have severe consequences, including data leakage, privilege escalation, and lateral movement within the network. Organizations running WordPress sites with this plugin are at risk, especially if they allow Author-level user registrations or have compromised user accounts. The medium severity score reflects the balance between required privileges and the potential damage. The absence of known exploits reduces immediate risk but does not eliminate it, as attackers may develop exploits. The vulnerability could be leveraged in targeted attacks against organizations with sensitive internal services accessible only from the web server, making it a significant threat to data security and internal network integrity.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first restrict Author-level and higher privileges to trusted users only, minimizing the risk of exploitation by malicious insiders or compromised accounts. Implement strict user access controls and monitor user activities for suspicious behavior. Network segmentation should be employed to limit the web server's ability to reach sensitive internal services, reducing the impact of SSRF attacks. Web application firewalls (WAFs) can be configured to detect and block unusual outbound requests originating from the web server. Until an official patch is released, consider disabling or removing the Gutenberg Essential Blocks plugin if feasible, or restrict its usage to environments where risk is minimal. Regularly monitor security advisories from the plugin vendor and WordPress community for updates or patches. Additionally, conduct internal audits of logs to detect anomalous request patterns indicative of SSRF exploitation attempts. Employing runtime application self-protection (RASP) solutions can also help detect and prevent SSRF attacks in real-time.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-06T09:25:38.394Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f319cceba81d1dad76b565
Added to database: 10/18/2025, 4:38:36 AM
Last enriched: 2/27/2026, 6:56:59 PM
Last updated: 3/25/2026, 4:03:23 AM
Views: 118
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.