CVE-2025-12800: CWE-918 Server-Side Request Forgery (SSRF) in gn_themes WP Shortcodes Plugin — Shortcodes Ultimate
The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 7.4.5 via the su_shortcode_csv_table function. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. If the 'Unsafe features' option is explicitly enabled by an administrator, this issue becomes exploitable by Contributor+ attackers
AI Analysis
Technical Summary
CVE-2025-12800 is a Server-Side Request Forgery (SSRF) vulnerability identified in the WP Shortcodes Plugin — Shortcodes Ultimate, a widely used WordPress plugin developed by gn_themes. The vulnerability exists in the su_shortcode_csv_table function and affects all versions up to and including 7.4.5. SSRF vulnerabilities allow attackers to induce the server-side application to make HTTP requests to arbitrary locations, potentially accessing internal or protected resources that are not directly accessible from the outside. In this case, exploitation requires the attacker to have authenticated access with Administrator-level privileges or higher. However, if the plugin's 'Unsafe features' option is explicitly enabled by an administrator, the attack surface expands to include users with Contributor-level access or above, significantly increasing risk. The vulnerability can be leveraged to query internal services, potentially exposing sensitive data or enabling modification of internal information. The CVSS v3.1 base score is 6.4 (medium severity), reflecting the network attack vector, low attack complexity, required privileges, no user interaction, and partial impact on confidentiality and integrity. There are no known public exploits or patches available at the time of publication. This vulnerability is particularly concerning for WordPress sites that rely on this plugin and have multiple user roles with elevated privileges. The SSRF can be used as a pivot point for further internal network reconnaissance or attacks, especially in environments with sensitive internal services accessible only from the web server.
Potential Impact
The primary impact of CVE-2025-12800 is on the confidentiality and integrity of internal systems accessible from the vulnerable WordPress server. An attacker with Administrator privileges can exploit the SSRF to send crafted requests to internal services, potentially extracting sensitive data or manipulating internal APIs. If the 'Unsafe features' option is enabled, lower-privileged users (Contributor+) can also exploit the vulnerability, increasing the risk of insider threats or compromised accounts causing damage. While availability is not directly impacted, successful exploitation could facilitate lateral movement within the network or data exfiltration, leading to broader compromise. Organizations hosting WordPress sites with this plugin may face data breaches, unauthorized internal access, or defacement if attackers leverage this SSRF as part of a multi-stage attack. The vulnerability is particularly dangerous in environments where internal services are trusted and lack additional authentication or network segmentation. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits rapidly after disclosure.
Mitigation Recommendations
To mitigate CVE-2025-12800, organizations should immediately update the WP Shortcodes Plugin — Shortcodes Ultimate to a patched version once available. Until a patch is released, administrators should disable the 'Unsafe features' option to prevent exploitation by lower-privileged users. Restrict WordPress user roles to the minimum necessary privileges, avoiding unnecessary Administrator or Contributor accounts. Implement strict network segmentation and firewall rules to limit the WordPress server's ability to access internal services. Monitor web server logs and internal service logs for unusual or unexpected requests originating from the WordPress server. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SSRF patterns targeting internal IP ranges. Conduct regular audits of installed plugins and remove or replace those that are unmaintained or vulnerable. Educate site administrators about the risks of enabling unsafe features and the importance of applying security updates promptly.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2025-12800: CWE-918 Server-Side Request Forgery (SSRF) in gn_themes WP Shortcodes Plugin — Shortcodes Ultimate
Description
The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 7.4.5 via the su_shortcode_csv_table function. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. If the 'Unsafe features' option is explicitly enabled by an administrator, this issue becomes exploitable by Contributor+ attackers
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-12800 is a Server-Side Request Forgery (SSRF) vulnerability identified in the WP Shortcodes Plugin — Shortcodes Ultimate, a widely used WordPress plugin developed by gn_themes. The vulnerability exists in the su_shortcode_csv_table function and affects all versions up to and including 7.4.5. SSRF vulnerabilities allow attackers to induce the server-side application to make HTTP requests to arbitrary locations, potentially accessing internal or protected resources that are not directly accessible from the outside. In this case, exploitation requires the attacker to have authenticated access with Administrator-level privileges or higher. However, if the plugin's 'Unsafe features' option is explicitly enabled by an administrator, the attack surface expands to include users with Contributor-level access or above, significantly increasing risk. The vulnerability can be leveraged to query internal services, potentially exposing sensitive data or enabling modification of internal information. The CVSS v3.1 base score is 6.4 (medium severity), reflecting the network attack vector, low attack complexity, required privileges, no user interaction, and partial impact on confidentiality and integrity. There are no known public exploits or patches available at the time of publication. This vulnerability is particularly concerning for WordPress sites that rely on this plugin and have multiple user roles with elevated privileges. The SSRF can be used as a pivot point for further internal network reconnaissance or attacks, especially in environments with sensitive internal services accessible only from the web server.
Potential Impact
The primary impact of CVE-2025-12800 is on the confidentiality and integrity of internal systems accessible from the vulnerable WordPress server. An attacker with Administrator privileges can exploit the SSRF to send crafted requests to internal services, potentially extracting sensitive data or manipulating internal APIs. If the 'Unsafe features' option is enabled, lower-privileged users (Contributor+) can also exploit the vulnerability, increasing the risk of insider threats or compromised accounts causing damage. While availability is not directly impacted, successful exploitation could facilitate lateral movement within the network or data exfiltration, leading to broader compromise. Organizations hosting WordPress sites with this plugin may face data breaches, unauthorized internal access, or defacement if attackers leverage this SSRF as part of a multi-stage attack. The vulnerability is particularly dangerous in environments where internal services are trusted and lack additional authentication or network segmentation. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits rapidly after disclosure.
Mitigation Recommendations
To mitigate CVE-2025-12800, organizations should immediately update the WP Shortcodes Plugin — Shortcodes Ultimate to a patched version once available. Until a patch is released, administrators should disable the 'Unsafe features' option to prevent exploitation by lower-privileged users. Restrict WordPress user roles to the minimum necessary privileges, avoiding unnecessary Administrator or Contributor accounts. Implement strict network segmentation and firewall rules to limit the WordPress server's ability to access internal services. Monitor web server logs and internal service logs for unusual or unexpected requests originating from the WordPress server. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SSRF patterns targeting internal IP ranges. Conduct regular audits of installed plugins and remove or replace those that are unmaintained or vulnerable. Educate site administrators about the risks of enabling unsafe features and the importance of applying security updates promptly.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-06T12:02:44.591Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69238d0dec5d308f09cb6a8c
Added to database: 11/23/2025, 10:39:09 PM
Last enriched: 2/27/2026, 9:09:38 PM
Last updated: 3/24/2026, 7:01:23 AM
Views: 146
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.