Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11427: CWE-918 Server-Side Request Forgery (SSRF) in wpengine WP Migrate Lite – WordPress Migration Made Easy

0
Medium
VulnerabilityCVE-2025-11427cvecve-2025-11427cwe-918
Published: Tue Nov 18 2025 (11/18/2025, 11:00:48 UTC)
Source: CVE Database V5
Vendor/Project: wpengine
Product: WP Migrate Lite – WordPress Migration Made Easy

Description

The WP Migrate Lite – WordPress Migration Made Easy plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 2.7.6 via the wpmdb_flush AJAX action. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to obtain information about internal services.

AI-Powered Analysis

AILast updated: 11/18/2025, 11:16:15 UTC

Technical Analysis

CVE-2025-11427 is a Blind Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, found in the WP Migrate Lite – WordPress Migration Made Easy plugin for WordPress. This vulnerability affects all versions up to and including 2.7.6. The flaw exists in the wpmdb_flush AJAX action, which does not properly validate or restrict URLs that the server can request. An unauthenticated attacker can exploit this by sending specially crafted requests to the vulnerable endpoint, causing the server to initiate HTTP requests to arbitrary locations. Because the requests originate from the server itself, attackers can use this to access internal network resources that are not directly reachable from the internet, such as internal APIs, databases, or metadata services. The 'blind' nature means the attacker does not receive the response content directly but can infer information based on side effects like timing or error messages. The vulnerability impacts confidentiality by potentially exposing internal network structure or sensitive data but does not affect integrity or availability. The CVSS v3.1 score is 5.8 (medium), reflecting the ease of exploitation (no authentication or user interaction required) but limited impact scope. No patches or exploits are currently publicly available, but the risk remains significant due to the widespread use of WordPress and this plugin for site migration tasks.

Potential Impact

For European organizations, this SSRF vulnerability poses a risk of internal network reconnaissance and potential data exposure. Many enterprises use WordPress for public-facing websites and rely on plugins like WP Migrate Lite for site migration and backup. Exploiting this vulnerability could allow attackers to bypass perimeter defenses and access internal services that are otherwise inaccessible externally, such as internal APIs, cloud metadata endpoints, or administrative interfaces. This could lead to further exploitation, lateral movement, or data leakage. Although the vulnerability does not directly allow code execution or denial of service, the ability to probe internal infrastructure is a critical step in complex attack chains. Organizations in Europe with sensitive internal services or cloud environments that rely on metadata services (e.g., AWS, Azure) are particularly at risk. The medium severity score reflects a moderate but non-negligible threat, especially given the unauthenticated nature of the exploit.

Mitigation Recommendations

Immediate mitigation should focus on restricting the vulnerable AJAX action by disabling or restricting access to the wpmdb_flush endpoint until a patch is available. Network-level controls should be implemented to limit outbound HTTP requests from web servers hosting WordPress to only trusted destinations, preventing SSRF exploitation from reaching internal services. Web Application Firewalls (WAFs) can be configured to detect and block suspicious requests targeting the vulnerable AJAX action. Monitoring and logging of outbound requests from web servers should be enhanced to detect anomalous behavior indicative of SSRF attempts. Once the vendor releases a patch, organizations must promptly update the WP Migrate Lite plugin to the fixed version. Additionally, reviewing internal network segmentation and minimizing exposure of sensitive internal services can reduce the attack surface. Security teams should also educate developers and administrators about SSRF risks and ensure secure coding practices for plugins and custom code.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-07T12:01:47.052Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691c544503ddb54749b63b2d

Added to database: 11/18/2025, 11:11:01 AM

Last enriched: 11/18/2025, 11:16:15 AM

Last updated: 11/19/2025, 4:15:21 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats