Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)

0
Medium
VulnerabilityCVE-2025-13393cvecve-2025-13393cwe-918
Published: Sat Jan 10 2026 (01/10/2026, 13:47:35 UTC)
Source: CVE Database V5
Vendor/Project: marceljm
Product: Featured Image from URL (FIFU)

Description

The Featured Image from URL (FIFU) plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.3.1. This is due to insufficient validation of user-supplied URLs before passing them to the getimagesize() function in the Elementor widget integration. This makes it possible for authenticated attackers, with Contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services via the fifu_input_url parameter in the FIFU Elementor widget granted they have permissions to use Elementor.

AI-Powered Analysis

AILast updated: 01/18/2026, 07:38:55 UTC

Technical Analysis

CVE-2025-13393 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Featured Image from URL (FIFU) plugin for WordPress, specifically affecting all versions up to and including 5.3.1. The root cause is insufficient validation of user-supplied URLs before they are passed to the PHP getimagesize() function within the Elementor widget integration. This function is used to retrieve image dimensions but, due to lack of proper sanitization, allows an authenticated attacker with Contributor-level permissions or higher (and access to Elementor) to supply arbitrary URLs via the fifu_input_url parameter. This enables the attacker to induce the server to make HTTP requests to arbitrary locations, including internal network resources that are otherwise inaccessible externally. Such SSRF can be leveraged for internal network reconnaissance, accessing sensitive internal services, or potentially modifying internal data if those services are vulnerable. The vulnerability does not require user interaction beyond authentication and Elementor access, and it does not directly impact integrity or availability but poses a confidentiality risk by exposing internal network information. The CVSS 3.1 base score is 4.3 (medium), reflecting network attack vector, low attack complexity, low privileges required, no user interaction, and limited confidentiality impact. No public exploits have been reported yet, but the vulnerability is published and should be addressed promptly. The lack of an official patch link suggests that users need to monitor vendor updates or apply workarounds.

Potential Impact

For European organizations, this SSRF vulnerability poses a moderate confidentiality risk. Attackers with Contributor-level access can leverage it to perform internal network reconnaissance, potentially discovering sensitive internal services or metadata endpoints that are not exposed externally. This could lead to further attacks such as lateral movement, data exfiltration, or exploitation of internal vulnerabilities. Organizations using WordPress with the FIFU plugin and Elementor integration are particularly at risk, especially if Contributor roles are widely assigned or if internal services lack proper segmentation and access controls. The vulnerability does not directly affect data integrity or availability but can serve as a stepping stone for more severe attacks. Given the widespread use of WordPress in Europe, especially in small and medium enterprises and public sector websites, the impact could be significant if exploited. The absence of known exploits reduces immediate risk but should not lead to complacency. Attackers targeting European entities with internal network reconnaissance capabilities may find this vulnerability useful, especially in countries with high WordPress adoption and critical infrastructure relying on internal web services.

Mitigation Recommendations

European organizations should take the following specific mitigation steps: 1) Immediately audit WordPress installations for the presence of the FIFU plugin and verify the version; upgrade to a patched version once available or disable the plugin if not essential. 2) Restrict Contributor-level permissions and Elementor widget usage to trusted users only, minimizing the attack surface. 3) Implement strict network segmentation and firewall rules to limit the WordPress server's ability to make arbitrary outbound HTTP requests, especially to internal services. 4) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests containing the fifu_input_url parameter or unusual URL patterns. 5) Monitor logs for unusual outbound requests from the web server that could indicate SSRF exploitation attempts. 6) Consider disabling or restricting the getimagesize() function usage or Elementor widget features that process external URLs until a patch is applied. 7) Educate administrators and developers about the risks of SSRF and the importance of validating user inputs, especially in plugins that handle external resources.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-19T01:08:40.615Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69625bacf2400df44e52a8e4

Added to database: 1/10/2026, 2:01:16 PM

Last enriched: 1/18/2026, 7:38:55 AM

Last updated: 2/6/2026, 12:23:08 PM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats