CVE-2025-13999: CWE-918 Server-Side Request Forgery (SSRF) in bplugins HTML5 Audio Player – The Ultimate No-Code Podcast, MP3 & Audio Player
The HTML5 Audio Player – The Ultimate No-Code Podcast, MP3 & Audio Player plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions from 2.4.0 up to, and including, 2.5.1 via the getIcyMetadata() function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
AI Analysis
Technical Summary
CVE-2025-13999 is a Server-Side Request Forgery (SSRF) vulnerability identified in the bplugins HTML5 Audio Player – The Ultimate No-Code Podcast, MP3 & Audio Player WordPress plugin, specifically affecting versions from 2.4.0 up to and including 2.5.1. The vulnerability resides in the getIcyMetadata() function, which processes metadata for audio streams. Due to insufficient validation of user-supplied input, an unauthenticated attacker can exploit this flaw to induce the server to send crafted HTTP requests to arbitrary internal or external network locations. This can be leveraged to access internal services that are otherwise inaccessible externally, potentially exposing sensitive information or enabling further attacks such as internal service enumeration or manipulation. The vulnerability has a CVSS 3.1 base score of 7.2, reflecting high severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. While no public exploits have been reported yet, the nature of SSRF vulnerabilities and the widespread use of WordPress plugins make this a significant risk. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts by administrators. The vulnerability impacts the confidentiality and integrity of internal systems but does not directly affect availability. Given the plugin’s popularity among podcast and audio content websites, the attack surface is broad, especially for sites that rely on this plugin for media playback.
Potential Impact
The SSRF vulnerability in the bplugins HTML5 Audio Player plugin can have severe consequences for organizations running affected WordPress sites. Attackers can exploit this flaw to bypass network access controls and reach internal services that are not exposed to the internet, such as internal APIs, databases, or cloud metadata services. This can lead to unauthorized disclosure of sensitive information, including credentials, configuration data, or internal network topology. Additionally, attackers may manipulate internal services if they accept HTTP requests, potentially altering data or causing misconfigurations. The vulnerability does not directly cause denial of service but can be a stepping stone for more complex attacks, including lateral movement within the network or privilege escalation. Organizations with internal services relying on network segmentation for security are particularly at risk. The ease of exploitation without authentication or user interaction increases the likelihood of automated scanning and exploitation attempts once the vulnerability becomes widely known. This can result in data breaches, compliance violations, and reputational damage. The impact is magnified in environments where the plugin is used on publicly accessible WordPress sites integrated with sensitive backend systems.
Mitigation Recommendations
To mitigate CVE-2025-13999, organizations should immediately assess their WordPress installations for the presence of the vulnerable bplugins HTML5 Audio Player plugin versions 2.4.0 through 2.5.1. If found, the plugin should be disabled or removed until a vendor patch is released. Network-level controls should be implemented to restrict outbound HTTP requests from the web server hosting WordPress, limiting them to only necessary destinations to reduce SSRF attack surface. Web Application Firewalls (WAFs) can be configured to detect and block suspicious requests targeting the getIcyMetadata() function or unusual request patterns indicative of SSRF attempts. Administrators should monitor logs for anomalous outbound connections and unusual internal service access. If patching is delayed, consider isolating the WordPress server in a segmented network zone with minimal access to internal resources. Additionally, review and harden internal services to require strong authentication and avoid trusting requests originating from the WordPress server. Regularly update all plugins and themes to the latest versions and subscribe to vulnerability advisories from the plugin vendor and WordPress security sources. Employing runtime application self-protection (RASP) solutions can also help detect and block SSRF exploitation attempts in real time.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan, South Korea
CVE-2025-13999: CWE-918 Server-Side Request Forgery (SSRF) in bplugins HTML5 Audio Player – The Ultimate No-Code Podcast, MP3 & Audio Player
Description
The HTML5 Audio Player – The Ultimate No-Code Podcast, MP3 & Audio Player plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions from 2.4.0 up to, and including, 2.5.1 via the getIcyMetadata() function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-13999 is a Server-Side Request Forgery (SSRF) vulnerability identified in the bplugins HTML5 Audio Player – The Ultimate No-Code Podcast, MP3 & Audio Player WordPress plugin, specifically affecting versions from 2.4.0 up to and including 2.5.1. The vulnerability resides in the getIcyMetadata() function, which processes metadata for audio streams. Due to insufficient validation of user-supplied input, an unauthenticated attacker can exploit this flaw to induce the server to send crafted HTTP requests to arbitrary internal or external network locations. This can be leveraged to access internal services that are otherwise inaccessible externally, potentially exposing sensitive information or enabling further attacks such as internal service enumeration or manipulation. The vulnerability has a CVSS 3.1 base score of 7.2, reflecting high severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. While no public exploits have been reported yet, the nature of SSRF vulnerabilities and the widespread use of WordPress plugins make this a significant risk. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts by administrators. The vulnerability impacts the confidentiality and integrity of internal systems but does not directly affect availability. Given the plugin’s popularity among podcast and audio content websites, the attack surface is broad, especially for sites that rely on this plugin for media playback.
Potential Impact
The SSRF vulnerability in the bplugins HTML5 Audio Player plugin can have severe consequences for organizations running affected WordPress sites. Attackers can exploit this flaw to bypass network access controls and reach internal services that are not exposed to the internet, such as internal APIs, databases, or cloud metadata services. This can lead to unauthorized disclosure of sensitive information, including credentials, configuration data, or internal network topology. Additionally, attackers may manipulate internal services if they accept HTTP requests, potentially altering data or causing misconfigurations. The vulnerability does not directly cause denial of service but can be a stepping stone for more complex attacks, including lateral movement within the network or privilege escalation. Organizations with internal services relying on network segmentation for security are particularly at risk. The ease of exploitation without authentication or user interaction increases the likelihood of automated scanning and exploitation attempts once the vulnerability becomes widely known. This can result in data breaches, compliance violations, and reputational damage. The impact is magnified in environments where the plugin is used on publicly accessible WordPress sites integrated with sensitive backend systems.
Mitigation Recommendations
To mitigate CVE-2025-13999, organizations should immediately assess their WordPress installations for the presence of the vulnerable bplugins HTML5 Audio Player plugin versions 2.4.0 through 2.5.1. If found, the plugin should be disabled or removed until a vendor patch is released. Network-level controls should be implemented to restrict outbound HTTP requests from the web server hosting WordPress, limiting them to only necessary destinations to reduce SSRF attack surface. Web Application Firewalls (WAFs) can be configured to detect and block suspicious requests targeting the getIcyMetadata() function or unusual request patterns indicative of SSRF attempts. Administrators should monitor logs for anomalous outbound connections and unusual internal service access. If patching is delayed, consider isolating the WordPress server in a segmented network zone with minimal access to internal resources. Additionally, review and harden internal services to require strong authentication and avoid trusting requests originating from the WordPress server. Regularly update all plugins and themes to the latest versions and subscribe to vulnerability advisories from the plugin vendor and WordPress security sources. Employing runtime application self-protection (RASP) solutions can also help detect and block SSRF exploitation attempts in real time.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-03T23:11:51.326Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6944f80919341fe18889df14
Added to database: 12/19/2025, 7:00:25 AM
Last enriched: 2/27/2026, 10:39:54 AM
Last updated: 3/25/2026, 3:55:46 AM
Views: 114
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.