Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12376: CWE-918 Server-Side Request Forgery (SSRF) in bplugins Icon List Block – Add Icon-Based Lists with Custom Styles

0
Medium
VulnerabilityCVE-2025-12376cvecve-2025-12376cwe-918
Published: Tue Nov 18 2025 (11/18/2025, 13:54:50 UTC)
Source: CVE Database V5
Vendor/Project: bplugins
Product: Icon List Block – Add Icon-Based Lists with Custom Styles

Description

CVE-2025-12376 is a Server-Side Request Forgery (SSRF) vulnerability in the WordPress plugin 'Icon List Block – Add Icon-Based Lists with Custom Styles' by bplugins, affecting all versions up to 1. 2. 1. Authenticated attackers with Subscriber-level access or higher can exploit this flaw via the fs_api_request function to make arbitrary web requests from the server, potentially accessing or modifying internal services. The vulnerability does not require user interaction but does require authentication with low privileges. The CVSS 3. 1 base score is 6. 4 (medium severity), reflecting low complexity and partial impact on confidentiality and integrity but no impact on availability. No known public exploits exist yet, and no patches have been published as of now. European organizations using this plugin on WordPress sites should prioritize mitigation to prevent internal network reconnaissance or data leakage.

AI-Powered Analysis

AILast updated: 11/25/2025, 14:26:46 UTC

Technical Analysis

CVE-2025-12376 is a Server-Side Request Forgery (SSRF) vulnerability identified in the WordPress plugin 'Icon List Block – Add Icon-Based Lists with Custom Styles' developed by bplugins. This vulnerability exists in all versions up to and including 1.2.1 and is exploitable via the plugin's fs_api_request function. SSRF vulnerabilities allow an attacker to abuse a vulnerable server to send crafted HTTP requests to arbitrary locations, often internal or protected network resources that are otherwise inaccessible externally. In this case, an attacker with at least Subscriber-level authentication privileges can trigger the vulnerability, which is significant because Subscriber is a low-privilege role in WordPress, often assigned to regular users or commenters. The attacker can make the server perform web requests to arbitrary URLs, potentially querying internal services or modifying information if those services accept such requests. The plugin only renders valid JSON objects in responses, which may limit some exploitation vectors but does not eliminate the risk. The CVSS 3.1 score of 6.4 indicates medium severity, with the vector string AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N meaning the attack is network-based, requires low privileges, no user interaction, and impacts confidentiality and integrity with a changed scope (likely meaning the attack affects resources beyond the vulnerable component). No patches or public exploits are currently available, but the vulnerability is published and should be addressed promptly. Given the widespread use of WordPress and the popularity of plugins for enhancing site functionality, this vulnerability poses a risk to many websites, especially those with multiple users and internal services accessible from the web server.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized internal network reconnaissance and potential data exposure or modification of internal services that are not directly accessible from the internet. Attackers exploiting this SSRF could pivot within the network, potentially accessing sensitive internal APIs, databases, or configuration endpoints. This could result in partial loss of confidentiality and integrity of data, especially if internal services lack strong authentication or authorization controls. Although availability is not directly impacted, the breach of internal systems could lead to further attacks or data leaks. Organizations relying on WordPress sites with this plugin, particularly those with multi-user environments or internal integrations, face increased risk. The medium severity score suggests the threat is significant but not critical, yet the low privilege requirement and network-based attack vector increase the likelihood of exploitation. The absence of known exploits in the wild currently provides a window for proactive mitigation. Failure to address this vulnerability could lead to targeted attacks against European enterprises, government portals, or e-commerce platforms using this plugin.

Mitigation Recommendations

1. Immediately audit WordPress installations to identify the presence of the 'Icon List Block – Add Icon-Based Lists with Custom Styles' plugin and its version. 2. Restrict plugin usage to trusted administrators and remove or disable it if not essential. 3. Limit user roles and permissions to the minimum necessary, especially restricting Subscriber-level users from accessing vulnerable functionality if possible. 4. Monitor outgoing HTTP requests from web servers hosting the plugin to detect unusual or unauthorized internal network requests. 5. Implement network segmentation and firewall rules to restrict web server access to sensitive internal services, reducing the impact of SSRF exploitation. 6. Once a patch or update is released by the vendor, apply it promptly. 7. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SSRF patterns targeting the fs_api_request function. 8. Conduct regular security assessments and penetration tests focusing on SSRF and internal service exposure. 9. Educate site administrators and developers about the risks of SSRF and the importance of validating and sanitizing all user inputs, even from authenticated users.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-28T00:08:02.684Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691c7c583fd37bbc39576641

Added to database: 11/18/2025, 2:02:00 PM

Last enriched: 11/25/2025, 2:26:46 PM

Last updated: 1/7/2026, 4:17:36 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats