Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12388: CWE-918 Server-Side Request Forgery (SSRF) in bplugins Carousel Block – Responsive Image and Content Carousel

0
Medium
VulnerabilityCVE-2025-12388cvecve-2025-12388cwe-918
Published: Wed Nov 05 2025 (11/05/2025, 06:35:01 UTC)
Source: CVE Database V5
Vendor/Project: bplugins
Product: Carousel Block – Responsive Image and Content Carousel

Description

The B Carousel Block – Responsive Image and Content Carousel plugin for WordPress is vulnerable to Server-Side Request Forgery in versions up to, and including, 1.1.5. This is due to the plugin not validating user-supplied URLs before passing them to the wp_remote_request() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 20:27:26 UTC

Technical Analysis

CVE-2025-12388 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, affecting the bplugins Carousel Block – Responsive Image and Content Carousel plugin for WordPress. This vulnerability exists in all versions up to and including 1.1.5 due to the plugin's failure to validate user-supplied URLs before forwarding them to the WordPress core function wp_remote_request(). This function is used to make HTTP requests from the server side. Because the plugin does not sanitize or restrict these URLs, an authenticated attacker with subscriber-level access or higher can craft requests that cause the server to initiate HTTP requests to arbitrary locations. This can be exploited to access internal network resources that are not normally exposed externally, potentially allowing attackers to gather sensitive information or interact with internal services. The vulnerability does not require user interaction beyond authentication and has a CVSS 3.1 base score of 6.4, reflecting medium severity with low attack complexity and privileges required. The scope is considered changed (S:C) because the attack can affect resources beyond the vulnerable component. No public exploits have been reported yet, but the vulnerability poses a risk to WordPress sites using this plugin, especially those with internal services accessible only from the web server. The lack of patch links suggests a fix may not yet be available, increasing urgency for mitigations.

Potential Impact

The primary impact of CVE-2025-12388 is unauthorized internal network reconnaissance and potential information disclosure. Attackers with subscriber-level access can leverage the SSRF vulnerability to send arbitrary HTTP requests from the vulnerable WordPress server to internal services, which are typically protected from external access. This can lead to exposure of sensitive internal endpoints, metadata services, or administrative interfaces, potentially allowing attackers to gather confidential data or pivot further into the network. Additionally, the attacker might manipulate internal services if those services accept HTTP requests that modify state, leading to integrity violations. Although the vulnerability does not directly allow remote code execution or denial of service, the ability to interact with internal systems can facilitate more severe attacks. Organizations running WordPress sites with this plugin are at risk of internal network exposure, which is especially critical in environments where WordPress servers have privileged network access. The medium severity score reflects moderate risk, but the real-world impact depends on the internal network architecture and the privileges of the compromised WordPress user accounts.

Mitigation Recommendations

To mitigate CVE-2025-12388, organizations should immediately restrict or disable the vulnerable plugin if possible until a patch is available. If disabling is not feasible, implement strict input validation on URLs submitted via the plugin to ensure only safe, whitelisted domains or IP ranges are allowed. Employ network segmentation and firewall rules to limit the WordPress server's ability to reach sensitive internal services, reducing the attack surface for SSRF exploitation. Enforce the principle of least privilege by limiting subscriber-level user capabilities and monitoring for unusual user behavior or requests. Additionally, enable logging and monitoring of outbound HTTP requests from the WordPress server to detect suspicious SSRF attempts. Consider deploying Web Application Firewalls (WAFs) with rules designed to detect and block SSRF patterns. Finally, stay updated with the plugin vendor’s announcements and apply patches promptly once released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-28T13:10:16.204Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690af19c063e7c5f011fbd4f

Added to database: 11/5/2025, 6:41:32 AM

Last enriched: 2/27/2026, 8:27:26 PM

Last updated: 3/25/2026, 2:54:45 AM

Views: 113

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses