CVE-2025-11467: CWE-918 Server-Side Request Forgery (SSRF) in themeisle RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator
The RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 5.1.1 via the feedzy_lazy_load function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
AI Analysis
Technical Summary
CVE-2025-11467 is a Blind Server-Side Request Forgery (SSRF) vulnerability identified in the 'RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator' WordPress plugin, which is widely used for aggregating RSS feeds and autoblogging. The vulnerability exists in the feedzy_lazy_load function, which improperly validates user-supplied input used to generate server-side HTTP requests. This flaw allows unauthenticated attackers to induce the server to send HTTP requests to arbitrary locations, including internal network resources that are otherwise inaccessible externally. Because the SSRF is blind, attackers do not receive direct responses but can infer information based on side effects or timing. The vulnerability affects all versions up to and including 5.1.1. The CVSS 3.1 base score is 5.8, reflecting medium severity with network attack vector, no privileges required, no user interaction, and limited confidentiality impact. Exploitation could lead to information disclosure from internal services or potentially facilitate further attacks such as internal network reconnaissance or pivoting. No patches or exploits are currently publicly available, but the risk remains significant due to the plugin's popularity and the common deployment of WordPress in various environments.
Potential Impact
For European organizations, this SSRF vulnerability poses a risk primarily to those running WordPress sites with the affected Feedzy plugin installed. Exploitation could allow attackers to access internal services behind firewalls, potentially exposing sensitive data or internal APIs. This could lead to information leakage, unauthorized internal network scanning, or indirect attacks on internal infrastructure. Given the plugin’s use in content aggregation and autoblogging, compromised sites might also be manipulated to serve malicious content or be used as pivot points for broader attacks. The impact is heightened for organizations with complex internal networks or those relying on internal web services for critical operations. Additionally, public-facing WordPress sites in sectors such as finance, healthcare, and government in Europe could be targeted to gain footholds or gather intelligence. The medium severity indicates that while direct system compromise is unlikely solely from this vulnerability, it can be a stepping stone in multi-stage attacks.
Mitigation Recommendations
Immediate mitigation should focus on restricting the ability of the WordPress server to make arbitrary outbound HTTP requests. Network-level controls such as egress filtering and web application firewalls (WAFs) can be configured to limit outbound connections to trusted endpoints only. Administrators should monitor and log outbound HTTP requests for suspicious activity. Since no official patch is currently available, disabling or uninstalling the Feedzy plugin temporarily can eliminate the attack surface. When a patch is released, prompt updating to the fixed version is critical. Additionally, applying the principle of least privilege to the web server environment, including limiting its network access and permissions, will reduce potential exploitation impact. Regular vulnerability scanning and penetration testing focused on SSRF vectors can help detect exploitation attempts. Finally, educating site administrators about the risks of installing unvetted plugins and maintaining an inventory of installed plugins will improve overall security posture.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-11467: CWE-918 Server-Side Request Forgery (SSRF) in themeisle RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator
Description
The RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 5.1.1 via the feedzy_lazy_load function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
AI-Powered Analysis
Technical Analysis
CVE-2025-11467 is a Blind Server-Side Request Forgery (SSRF) vulnerability identified in the 'RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator' WordPress plugin, which is widely used for aggregating RSS feeds and autoblogging. The vulnerability exists in the feedzy_lazy_load function, which improperly validates user-supplied input used to generate server-side HTTP requests. This flaw allows unauthenticated attackers to induce the server to send HTTP requests to arbitrary locations, including internal network resources that are otherwise inaccessible externally. Because the SSRF is blind, attackers do not receive direct responses but can infer information based on side effects or timing. The vulnerability affects all versions up to and including 5.1.1. The CVSS 3.1 base score is 5.8, reflecting medium severity with network attack vector, no privileges required, no user interaction, and limited confidentiality impact. Exploitation could lead to information disclosure from internal services or potentially facilitate further attacks such as internal network reconnaissance or pivoting. No patches or exploits are currently publicly available, but the risk remains significant due to the plugin's popularity and the common deployment of WordPress in various environments.
Potential Impact
For European organizations, this SSRF vulnerability poses a risk primarily to those running WordPress sites with the affected Feedzy plugin installed. Exploitation could allow attackers to access internal services behind firewalls, potentially exposing sensitive data or internal APIs. This could lead to information leakage, unauthorized internal network scanning, or indirect attacks on internal infrastructure. Given the plugin’s use in content aggregation and autoblogging, compromised sites might also be manipulated to serve malicious content or be used as pivot points for broader attacks. The impact is heightened for organizations with complex internal networks or those relying on internal web services for critical operations. Additionally, public-facing WordPress sites in sectors such as finance, healthcare, and government in Europe could be targeted to gain footholds or gather intelligence. The medium severity indicates that while direct system compromise is unlikely solely from this vulnerability, it can be a stepping stone in multi-stage attacks.
Mitigation Recommendations
Immediate mitigation should focus on restricting the ability of the WordPress server to make arbitrary outbound HTTP requests. Network-level controls such as egress filtering and web application firewalls (WAFs) can be configured to limit outbound connections to trusted endpoints only. Administrators should monitor and log outbound HTTP requests for suspicious activity. Since no official patch is currently available, disabling or uninstalling the Feedzy plugin temporarily can eliminate the attack surface. When a patch is released, prompt updating to the fixed version is critical. Additionally, applying the principle of least privilege to the web server environment, including limiting its network access and permissions, will reduce potential exploitation impact. Regular vulnerability scanning and penetration testing focused on SSRF vectors can help detect exploitation attempts. Finally, educating site administrators about the risks of installing unvetted plugins and maintaining an inventory of installed plugins will improve overall security posture.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-07T20:51:21.871Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693a30aebbbecd30a6f4475d
Added to database: 12/11/2025, 2:47:10 AM
Last enriched: 12/18/2025, 4:57:59 AM
Last updated: 2/7/2026, 7:02:41 PM
Views: 132
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2107: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2105: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2090: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.