CVE-2025-12800: CWE-918 Server-Side Request Forgery (SSRF) in gn_themes WP Shortcodes Plugin — Shortcodes Ultimate
The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 7.4.5 via the su_shortcode_csv_table function. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. If the 'Unsafe features' option is explicitly enabled by an administrator, this issue becomes exploitable by Contributor+ attackers
AI Analysis
Technical Summary
CVE-2025-12800 is a Server-Side Request Forgery (SSRF) vulnerability identified in the WP Shortcodes Plugin — Shortcodes Ultimate, a popular WordPress plugin developed by gn_themes. The vulnerability exists in the su_shortcode_csv_table function and affects all plugin versions up to and including 7.4.5. SSRF vulnerabilities allow attackers to abuse the server to send crafted HTTP requests to arbitrary locations, including internal network services that are otherwise inaccessible externally. In this case, exploitation requires the attacker to have authenticated access with Administrator privileges, enabling them to leverage the vulnerability to query or modify internal services. Notably, if the plugin's 'Unsafe features' option is explicitly enabled by an administrator, the attack surface expands to include users with Contributor-level access or higher, lowering the barrier for exploitation. The vulnerability does not require user interaction and has a CVSS 3.1 base score of 6.4, reflecting a medium severity with a vector indicating network attack vector, low attack complexity, privileges required, no user interaction, and partial impact on confidentiality and integrity but no impact on availability. No public exploits have been reported yet, but the vulnerability poses a risk of internal network reconnaissance, data leakage, or unauthorized modification of internal services. The plugin is widely used in WordPress environments, which are prevalent across many European organizations, especially those relying on WordPress for content management and web presence.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized internal network scanning, data exfiltration, or manipulation of internal services if exploited. Since the vulnerability requires at least Administrator-level access (or Contributor-level if unsafe features are enabled), the risk is primarily from insider threats or compromised credentials. Exploitation could allow attackers to bypass perimeter defenses by leveraging the web server as a proxy to access internal resources, potentially exposing sensitive data or disrupting internal operations. Organizations with complex internal networks or sensitive internal APIs are at higher risk. The impact on confidentiality and integrity is moderate, with no direct availability impact. Given the widespread use of WordPress and this plugin in Europe, especially in sectors like media, education, and small to medium enterprises, the vulnerability could be leveraged to gain footholds or pivot within networks. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure.
Mitigation Recommendations
1. Immediately update the WP Shortcodes Plugin — Shortcodes Ultimate to a patched version once available; if no patch exists yet, consider disabling or removing the plugin temporarily. 2. Restrict plugin usage to trusted administrators only and audit user roles to ensure no unnecessary users have Administrator or Contributor privileges, especially if 'Unsafe features' are enabled. 3. Disable the 'Unsafe features' option in the plugin settings to reduce the attack surface. 4. Implement strict network segmentation and firewall rules to limit the web server's ability to make outbound requests to internal services, effectively containing potential SSRF exploitation. 5. Monitor web server logs and internal service access logs for unusual or unexpected requests originating from the WordPress server. 6. Employ Web Application Firewalls (WAFs) with rules to detect and block SSRF patterns or suspicious internal requests. 7. Conduct regular security audits and penetration tests focusing on WordPress environments and plugins to identify similar vulnerabilities. 8. Educate administrators and contributors about the risks of enabling unsafe plugin features and the importance of strong credential management.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12800: CWE-918 Server-Side Request Forgery (SSRF) in gn_themes WP Shortcodes Plugin — Shortcodes Ultimate
Description
The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 7.4.5 via the su_shortcode_csv_table function. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. If the 'Unsafe features' option is explicitly enabled by an administrator, this issue becomes exploitable by Contributor+ attackers
AI-Powered Analysis
Technical Analysis
CVE-2025-12800 is a Server-Side Request Forgery (SSRF) vulnerability identified in the WP Shortcodes Plugin — Shortcodes Ultimate, a popular WordPress plugin developed by gn_themes. The vulnerability exists in the su_shortcode_csv_table function and affects all plugin versions up to and including 7.4.5. SSRF vulnerabilities allow attackers to abuse the server to send crafted HTTP requests to arbitrary locations, including internal network services that are otherwise inaccessible externally. In this case, exploitation requires the attacker to have authenticated access with Administrator privileges, enabling them to leverage the vulnerability to query or modify internal services. Notably, if the plugin's 'Unsafe features' option is explicitly enabled by an administrator, the attack surface expands to include users with Contributor-level access or higher, lowering the barrier for exploitation. The vulnerability does not require user interaction and has a CVSS 3.1 base score of 6.4, reflecting a medium severity with a vector indicating network attack vector, low attack complexity, privileges required, no user interaction, and partial impact on confidentiality and integrity but no impact on availability. No public exploits have been reported yet, but the vulnerability poses a risk of internal network reconnaissance, data leakage, or unauthorized modification of internal services. The plugin is widely used in WordPress environments, which are prevalent across many European organizations, especially those relying on WordPress for content management and web presence.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized internal network scanning, data exfiltration, or manipulation of internal services if exploited. Since the vulnerability requires at least Administrator-level access (or Contributor-level if unsafe features are enabled), the risk is primarily from insider threats or compromised credentials. Exploitation could allow attackers to bypass perimeter defenses by leveraging the web server as a proxy to access internal resources, potentially exposing sensitive data or disrupting internal operations. Organizations with complex internal networks or sensitive internal APIs are at higher risk. The impact on confidentiality and integrity is moderate, with no direct availability impact. Given the widespread use of WordPress and this plugin in Europe, especially in sectors like media, education, and small to medium enterprises, the vulnerability could be leveraged to gain footholds or pivot within networks. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure.
Mitigation Recommendations
1. Immediately update the WP Shortcodes Plugin — Shortcodes Ultimate to a patched version once available; if no patch exists yet, consider disabling or removing the plugin temporarily. 2. Restrict plugin usage to trusted administrators only and audit user roles to ensure no unnecessary users have Administrator or Contributor privileges, especially if 'Unsafe features' are enabled. 3. Disable the 'Unsafe features' option in the plugin settings to reduce the attack surface. 4. Implement strict network segmentation and firewall rules to limit the web server's ability to make outbound requests to internal services, effectively containing potential SSRF exploitation. 5. Monitor web server logs and internal service access logs for unusual or unexpected requests originating from the WordPress server. 6. Employ Web Application Firewalls (WAFs) with rules to detect and block SSRF patterns or suspicious internal requests. 7. Conduct regular security audits and penetration tests focusing on WordPress environments and plugins to identify similar vulnerabilities. 8. Educate administrators and contributors about the risks of enabling unsafe plugin features and the importance of strong credential management.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-06T12:02:44.591Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69238d0dec5d308f09cb6a8c
Added to database: 11/23/2025, 10:39:09 PM
Last enriched: 11/30/2025, 11:10:50 PM
Last updated: 1/8/2026, 10:32:39 PM
Views: 97
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0729: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2025-14436: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in neeraj_slit Brevo for WooCommerce
HighCVE-2025-68718: n/a
MediumCVE-2025-15464: CWE-926 Improper Export of Android Application Components in yintibao Fun Print Mobile
HighCVE-2025-14505: CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation in Elliptic
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.