Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12376: CWE-918 Server-Side Request Forgery (SSRF) in bplugins Icon List Block – Add Icon-Based Lists with Custom Styles

0
Medium
VulnerabilityCVE-2025-12376cvecve-2025-12376cwe-918
Published: Tue Nov 18 2025 (11/18/2025, 13:54:50 UTC)
Source: CVE Database V5
Vendor/Project: bplugins
Product: Icon List Block – Add Icon-Based Lists with Custom Styles

Description

The Icon List Block – Add Icon-Based Lists with Custom Styles plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.2.1 via the fs_api_request function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. Only valid JSON objects are rendered in the response.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 20:26:23 UTC

Technical Analysis

The vulnerability identified as CVE-2025-12376 affects the WordPress plugin 'Icon List Block – Add Icon-Based Lists with Custom Styles' developed by bplugins. This plugin, widely used to create icon-based lists with custom styles, contains a Server-Side Request Forgery (SSRF) flaw in its fs_api_request function. SSRF vulnerabilities allow attackers to induce the server to make HTTP requests to arbitrary locations, including internal network services that are otherwise inaccessible externally. In this case, the vulnerability can be exploited by any authenticated user with Subscriber-level privileges or higher, which is a relatively low privilege level in WordPress. The attacker can craft requests that the server will execute, potentially querying or modifying internal resources. The plugin only renders valid JSON objects in responses, which may limit some exploitation vectors but does not eliminate risk. The vulnerability affects all versions up to and including 1.2.1, with no patches currently available. The CVSS 3.1 score of 6.4 reflects a medium severity rating, with network attack vector, low attack complexity, privileges required, no user interaction, and a scope change due to potential impact on internal services. No known exploits are publicly reported yet, but the vulnerability poses a risk of information disclosure and integrity compromise within internal environments.

Potential Impact

This SSRF vulnerability can have significant impacts on organizations running WordPress sites with the affected plugin. Attackers with low-level authenticated access can leverage the vulnerability to pivot into internal networks, potentially accessing sensitive internal services such as databases, metadata services, or internal APIs that are not exposed externally. This can lead to unauthorized data disclosure, modification of internal resources, and reconnaissance for further attacks. Although availability impact is not indicated, the confidentiality and integrity of internal systems are at risk. Organizations with complex internal networks or sensitive internal services exposed only to trusted hosts are particularly vulnerable. The medium CVSS score suggests a moderate risk, but the ease of exploitation by low-privilege users increases the threat. The lack of public exploits currently reduces immediate risk, but the vulnerability should be treated seriously given the potential for lateral movement and internal service compromise.

Mitigation Recommendations

1. Immediately restrict WordPress user roles to the minimum necessary, especially limiting Subscriber-level users from untrusted sources. 2. Implement strict network segmentation and firewall rules to limit the WordPress server's ability to access internal services unnecessarily. 3. Monitor and log outbound HTTP requests from the WordPress server to detect anomalous or unauthorized internal requests. 4. Disable or remove the vulnerable plugin if it is not essential to reduce the attack surface. 5. Apply principle of least privilege on internal services to minimize damage if SSRF is exploited. 6. Once available, promptly apply official patches or updates from bplugins addressing this vulnerability. 7. Consider using Web Application Firewalls (WAFs) with custom rules to detect and block SSRF patterns targeting the fs_api_request function. 8. Conduct internal audits of WordPress installations to identify affected versions and prioritize remediation. 9. Educate administrators and developers about SSRF risks and secure coding practices to prevent similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-28T00:08:02.684Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691c7c583fd37bbc39576641

Added to database: 11/18/2025, 2:02:00 PM

Last enriched: 2/27/2026, 8:26:23 PM

Last updated: 3/22/2026, 10:15:43 PM

Views: 99

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses