CVE-2025-12376: CWE-918 Server-Side Request Forgery (SSRF) in bplugins Icon List Block – Add Icon-Based Lists with Custom Styles
The Icon List Block – Add Icon-Based Lists with Custom Styles plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.2.1 via the fs_api_request function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. Only valid JSON objects are rendered in the response.
AI Analysis
Technical Summary
CVE-2025-12376 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, found in the WordPress plugin 'Icon List Block – Add Icon-Based Lists with Custom Styles' developed by bplugins. This vulnerability affects all versions up to and including 1.2.1. The root cause lies in the fs_api_request function, which improperly handles user-supplied input to make web requests from the server-side context. An attacker with at least Subscriber-level privileges (a low-level authenticated user role in WordPress) can exploit this flaw to induce the server to send HTTP requests to arbitrary URLs. This can be leveraged to access internal services that are not exposed externally, potentially bypassing network segmentation or firewall rules. The vulnerability allows attackers to query internal endpoints and possibly modify data if internal services accept such requests. The plugin only renders valid JSON objects in the response, which somewhat limits the attacker's ability to extract arbitrary data but does not eliminate the risk. The vulnerability does not require user interaction beyond authentication, and the CVSS 3.1 base score is 6.4, indicating medium severity. The attack vector is network-based (remote), with low attack complexity and privileges required. The scope is changed, meaning the vulnerability affects components beyond the initially vulnerable plugin, potentially impacting internal services. No patches or exploit code are currently publicly available, and no known exploits have been reported in the wild as of the publication date (November 18, 2025).
Potential Impact
For European organizations, this SSRF vulnerability poses a significant risk, especially for those heavily reliant on WordPress for their web presence and using the affected plugin. The ability for low-privileged authenticated users to make arbitrary server-side requests can lead to unauthorized internal network reconnaissance, exposing sensitive internal services such as databases, internal APIs, or cloud metadata services. This can facilitate further attacks like data exfiltration, privilege escalation, or lateral movement within the network. Confidentiality and integrity of internal data are at risk, although availability is not directly impacted. Organizations in sectors with strict data protection regulations (e.g., GDPR) may face compliance risks if internal data is exposed or manipulated. The medium severity rating suggests a moderate but non-trivial threat that should be addressed promptly to prevent exploitation. The lack of known exploits in the wild provides a window for proactive mitigation.
Mitigation Recommendations
1. Immediate mitigation should include updating the 'Icon List Block – Add Icon-Based Lists with Custom Styles' plugin to a patched version once available from the vendor. 2. Until a patch is released, restrict plugin usage to trusted users only, limiting Subscriber-level access where possible. 3. Implement strict network segmentation and firewall rules to limit the web server's ability to make outbound requests to internal services, effectively reducing the SSRF attack surface. 4. Monitor web server logs for unusual outbound requests or patterns indicative of SSRF exploitation attempts. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable plugin endpoints. 6. Conduct internal audits of WordPress user roles and permissions to ensure minimal privilege principles are enforced. 7. Consider disabling or removing the vulnerable plugin if it is not essential to business operations. 8. Educate administrators and developers about SSRF risks and secure coding practices to prevent similar vulnerabilities in custom plugins or themes.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12376: CWE-918 Server-Side Request Forgery (SSRF) in bplugins Icon List Block – Add Icon-Based Lists with Custom Styles
Description
The Icon List Block – Add Icon-Based Lists with Custom Styles plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.2.1 via the fs_api_request function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. Only valid JSON objects are rendered in the response.
AI-Powered Analysis
Technical Analysis
CVE-2025-12376 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, found in the WordPress plugin 'Icon List Block – Add Icon-Based Lists with Custom Styles' developed by bplugins. This vulnerability affects all versions up to and including 1.2.1. The root cause lies in the fs_api_request function, which improperly handles user-supplied input to make web requests from the server-side context. An attacker with at least Subscriber-level privileges (a low-level authenticated user role in WordPress) can exploit this flaw to induce the server to send HTTP requests to arbitrary URLs. This can be leveraged to access internal services that are not exposed externally, potentially bypassing network segmentation or firewall rules. The vulnerability allows attackers to query internal endpoints and possibly modify data if internal services accept such requests. The plugin only renders valid JSON objects in the response, which somewhat limits the attacker's ability to extract arbitrary data but does not eliminate the risk. The vulnerability does not require user interaction beyond authentication, and the CVSS 3.1 base score is 6.4, indicating medium severity. The attack vector is network-based (remote), with low attack complexity and privileges required. The scope is changed, meaning the vulnerability affects components beyond the initially vulnerable plugin, potentially impacting internal services. No patches or exploit code are currently publicly available, and no known exploits have been reported in the wild as of the publication date (November 18, 2025).
Potential Impact
For European organizations, this SSRF vulnerability poses a significant risk, especially for those heavily reliant on WordPress for their web presence and using the affected plugin. The ability for low-privileged authenticated users to make arbitrary server-side requests can lead to unauthorized internal network reconnaissance, exposing sensitive internal services such as databases, internal APIs, or cloud metadata services. This can facilitate further attacks like data exfiltration, privilege escalation, or lateral movement within the network. Confidentiality and integrity of internal data are at risk, although availability is not directly impacted. Organizations in sectors with strict data protection regulations (e.g., GDPR) may face compliance risks if internal data is exposed or manipulated. The medium severity rating suggests a moderate but non-trivial threat that should be addressed promptly to prevent exploitation. The lack of known exploits in the wild provides a window for proactive mitigation.
Mitigation Recommendations
1. Immediate mitigation should include updating the 'Icon List Block – Add Icon-Based Lists with Custom Styles' plugin to a patched version once available from the vendor. 2. Until a patch is released, restrict plugin usage to trusted users only, limiting Subscriber-level access where possible. 3. Implement strict network segmentation and firewall rules to limit the web server's ability to make outbound requests to internal services, effectively reducing the SSRF attack surface. 4. Monitor web server logs for unusual outbound requests or patterns indicative of SSRF exploitation attempts. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable plugin endpoints. 6. Conduct internal audits of WordPress user roles and permissions to ensure minimal privilege principles are enforced. 7. Consider disabling or removing the vulnerable plugin if it is not essential to business operations. 8. Educate administrators and developers about SSRF risks and secure coding practices to prevent similar vulnerabilities in custom plugins or themes.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-28T00:08:02.684Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691c7c583fd37bbc39576641
Added to database: 11/18/2025, 2:02:00 PM
Last enriched: 11/18/2025, 2:16:51 PM
Last updated: 11/19/2025, 3:52:20 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-6251: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wproyal Royal Addons for Elementor – Addons and Templates Kit for Elementor
MediumCVE-2025-12777: CWE-285 Improper Authorization in yithemes YITH WooCommerce Wishlist
MediumCVE-2025-12770: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in saadiqbal New User Approve
MediumCVE-2025-12427: CWE-639 Authorization Bypass Through User-Controlled Key in yithemes YITH WooCommerce Wishlist
MediumCVE-2025-13051: CWE-427 Uncontrolled Search Path Element in ASUSTOR ABP and AES
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.