Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13999: CWE-918 Server-Side Request Forgery (SSRF) in bplugins HTML5 Audio Player – The Ultimate No-Code Podcast, MP3 & Audio Player

0
High
VulnerabilityCVE-2025-13999cvecve-2025-13999cwe-918
Published: Fri Dec 19 2025 (12/19/2025, 06:48:23 UTC)
Source: CVE Database V5
Vendor/Project: bplugins
Product: HTML5 Audio Player – The Ultimate No-Code Podcast, MP3 & Audio Player

Description

The HTML5 Audio Player – The Ultimate No-Code Podcast, MP3 & Audio Player plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions from 2.4.0 up to, and including, 2.5.1 via the getIcyMetadata() function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

AI-Powered Analysis

AILast updated: 12/19/2025, 07:15:20 UTC

Technical Analysis

CVE-2025-13999 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, affecting the bplugins HTML5 Audio Player – The Ultimate No-Code Podcast, MP3 & Audio Player WordPress plugin versions 2.4.0 through 2.5.1. The vulnerability resides in the getIcyMetadata() function, which processes metadata for streaming audio content. Due to insufficient validation of user-supplied URLs, an unauthenticated attacker can craft requests that cause the server to perform arbitrary HTTP requests to internal or external systems. This SSRF can be exploited to access internal services that are otherwise inaccessible externally, potentially exposing sensitive information or enabling further attacks such as internal network reconnaissance, data exfiltration, or modification of internal resources. The vulnerability does not require authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 7.2, with vector AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N, indicating network attack vector, low attack complexity, no privileges or user interaction required, and a scope change due to impact on resources beyond the vulnerable component. The impact primarily affects confidentiality and integrity, with no direct availability impact. No patches were listed at the time of disclosure, and no known exploits have been observed in the wild. However, the presence of this vulnerability in a popular WordPress plugin used for podcasting and audio playback means that many websites could be exposed, especially those hosting internal services accessible from the web server. Attackers could leverage this SSRF to pivot into internal networks or access cloud metadata services, depending on the hosting environment.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on WordPress sites with the affected plugin installed. Organizations hosting internal services such as intranet portals, cloud metadata endpoints, or internal APIs accessible from the web server could have these services queried or manipulated by attackers. This could lead to unauthorized disclosure of sensitive information, including credentials or configuration data, and potentially allow attackers to escalate privileges or move laterally within the network. Media companies, podcast platforms, and content providers using this plugin are particularly at risk, as exploitation could compromise their infrastructure and content integrity. The vulnerability's ease of exploitation without authentication increases the likelihood of automated scanning and attacks. Additionally, the scope change in the CVSS vector indicates that the impact extends beyond the plugin itself, potentially affecting the broader internal network. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers often develop exploits rapidly after disclosure. European data protection regulations such as GDPR also mean that data breaches resulting from this vulnerability could lead to significant legal and financial consequences.

Mitigation Recommendations

1. Immediate mitigation should focus on network-level controls: restrict outbound HTTP/HTTPS requests from the web server hosting the WordPress plugin to only trusted destinations, using firewall rules or proxy configurations. 2. Monitor and log outbound requests from the web server to detect anomalous or unexpected destinations, which may indicate exploitation attempts. 3. Isolate internal services and metadata endpoints (e.g., cloud provider metadata APIs) to only allow access from authorized systems, preventing SSRF from reaching these targets. 4. Apply strict input validation and sanitization on any user-supplied URLs or parameters related to audio metadata if custom modifications are possible. 5. Regularly check for and apply official patches or updates from the plugin vendor once available. 6. Conduct security assessments and penetration testing focusing on SSRF vectors in WordPress environments. 7. Educate site administrators about the risks of installing plugins from unverified sources and maintaining up-to-date software. 8. Consider disabling or replacing the affected plugin with alternative audio player solutions that do not exhibit SSRF vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-03T23:11:51.326Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6944f80919341fe18889df14

Added to database: 12/19/2025, 7:00:25 AM

Last enriched: 12/19/2025, 7:15:20 AM

Last updated: 12/19/2025, 8:43:13 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats