Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12376: CWE-918 Server-Side Request Forgery (SSRF) in bplugins Icon List Block – Add Icon-Based Lists with Custom Styles

0
Medium
VulnerabilityCVE-2025-12376cvecve-2025-12376cwe-918
Published: Tue Nov 18 2025 (11/18/2025, 13:54:50 UTC)
Source: CVE Database V5
Vendor/Project: bplugins
Product: Icon List Block – Add Icon-Based Lists with Custom Styles

Description

The Icon List Block – Add Icon-Based Lists with Custom Styles plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.2.1 via the fs_api_request function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. Only valid JSON objects are rendered in the response.

AI-Powered Analysis

AILast updated: 11/18/2025, 14:16:51 UTC

Technical Analysis

CVE-2025-12376 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, found in the WordPress plugin 'Icon List Block – Add Icon-Based Lists with Custom Styles' developed by bplugins. This vulnerability affects all versions up to and including 1.2.1. The root cause lies in the fs_api_request function, which improperly handles user-supplied input to make web requests from the server-side context. An attacker with at least Subscriber-level privileges (a low-level authenticated user role in WordPress) can exploit this flaw to induce the server to send HTTP requests to arbitrary URLs. This can be leveraged to access internal services that are not exposed externally, potentially bypassing network segmentation or firewall rules. The vulnerability allows attackers to query internal endpoints and possibly modify data if internal services accept such requests. The plugin only renders valid JSON objects in the response, which somewhat limits the attacker's ability to extract arbitrary data but does not eliminate the risk. The vulnerability does not require user interaction beyond authentication, and the CVSS 3.1 base score is 6.4, indicating medium severity. The attack vector is network-based (remote), with low attack complexity and privileges required. The scope is changed, meaning the vulnerability affects components beyond the initially vulnerable plugin, potentially impacting internal services. No patches or exploit code are currently publicly available, and no known exploits have been reported in the wild as of the publication date (November 18, 2025).

Potential Impact

For European organizations, this SSRF vulnerability poses a significant risk, especially for those heavily reliant on WordPress for their web presence and using the affected plugin. The ability for low-privileged authenticated users to make arbitrary server-side requests can lead to unauthorized internal network reconnaissance, exposing sensitive internal services such as databases, internal APIs, or cloud metadata services. This can facilitate further attacks like data exfiltration, privilege escalation, or lateral movement within the network. Confidentiality and integrity of internal data are at risk, although availability is not directly impacted. Organizations in sectors with strict data protection regulations (e.g., GDPR) may face compliance risks if internal data is exposed or manipulated. The medium severity rating suggests a moderate but non-trivial threat that should be addressed promptly to prevent exploitation. The lack of known exploits in the wild provides a window for proactive mitigation.

Mitigation Recommendations

1. Immediate mitigation should include updating the 'Icon List Block – Add Icon-Based Lists with Custom Styles' plugin to a patched version once available from the vendor. 2. Until a patch is released, restrict plugin usage to trusted users only, limiting Subscriber-level access where possible. 3. Implement strict network segmentation and firewall rules to limit the web server's ability to make outbound requests to internal services, effectively reducing the SSRF attack surface. 4. Monitor web server logs for unusual outbound requests or patterns indicative of SSRF exploitation attempts. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable plugin endpoints. 6. Conduct internal audits of WordPress user roles and permissions to ensure minimal privilege principles are enforced. 7. Consider disabling or removing the vulnerable plugin if it is not essential to business operations. 8. Educate administrators and developers about SSRF risks and secure coding practices to prevent similar vulnerabilities in custom plugins or themes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-28T00:08:02.684Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691c7c583fd37bbc39576641

Added to database: 11/18/2025, 2:02:00 PM

Last enriched: 11/18/2025, 2:16:51 PM

Last updated: 11/19/2025, 3:52:20 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats