Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13999: CWE-918 Server-Side Request Forgery (SSRF) in bplugins HTML5 Audio Player – The Ultimate No-Code Podcast, MP3 & Audio Player

0
High
VulnerabilityCVE-2025-13999cvecve-2025-13999cwe-918
Published: Fri Dec 19 2025 (12/19/2025, 06:48:23 UTC)
Source: CVE Database V5
Vendor/Project: bplugins
Product: HTML5 Audio Player – The Ultimate No-Code Podcast, MP3 & Audio Player

Description

The HTML5 Audio Player – The Ultimate No-Code Podcast, MP3 & Audio Player plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions from 2.4.0 up to, and including, 2.5.1 via the getIcyMetadata() function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 10:39:54 UTC

Technical Analysis

CVE-2025-13999 is a Server-Side Request Forgery (SSRF) vulnerability identified in the bplugins HTML5 Audio Player – The Ultimate No-Code Podcast, MP3 & Audio Player WordPress plugin, specifically affecting versions from 2.4.0 up to and including 2.5.1. The vulnerability resides in the getIcyMetadata() function, which processes metadata for audio streams. Due to insufficient validation of user-supplied input, an unauthenticated attacker can exploit this flaw to induce the server to send crafted HTTP requests to arbitrary internal or external network locations. This can be leveraged to access internal services that are otherwise inaccessible externally, potentially exposing sensitive information or enabling further attacks such as internal service enumeration or manipulation. The vulnerability has a CVSS 3.1 base score of 7.2, reflecting high severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. While no public exploits have been reported yet, the nature of SSRF vulnerabilities and the widespread use of WordPress plugins make this a significant risk. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts by administrators. The vulnerability impacts the confidentiality and integrity of internal systems but does not directly affect availability. Given the plugin’s popularity among podcast and audio content websites, the attack surface is broad, especially for sites that rely on this plugin for media playback.

Potential Impact

The SSRF vulnerability in the bplugins HTML5 Audio Player plugin can have severe consequences for organizations running affected WordPress sites. Attackers can exploit this flaw to bypass network access controls and reach internal services that are not exposed to the internet, such as internal APIs, databases, or cloud metadata services. This can lead to unauthorized disclosure of sensitive information, including credentials, configuration data, or internal network topology. Additionally, attackers may manipulate internal services if they accept HTTP requests, potentially altering data or causing misconfigurations. The vulnerability does not directly cause denial of service but can be a stepping stone for more complex attacks, including lateral movement within the network or privilege escalation. Organizations with internal services relying on network segmentation for security are particularly at risk. The ease of exploitation without authentication or user interaction increases the likelihood of automated scanning and exploitation attempts once the vulnerability becomes widely known. This can result in data breaches, compliance violations, and reputational damage. The impact is magnified in environments where the plugin is used on publicly accessible WordPress sites integrated with sensitive backend systems.

Mitigation Recommendations

To mitigate CVE-2025-13999, organizations should immediately assess their WordPress installations for the presence of the vulnerable bplugins HTML5 Audio Player plugin versions 2.4.0 through 2.5.1. If found, the plugin should be disabled or removed until a vendor patch is released. Network-level controls should be implemented to restrict outbound HTTP requests from the web server hosting WordPress, limiting them to only necessary destinations to reduce SSRF attack surface. Web Application Firewalls (WAFs) can be configured to detect and block suspicious requests targeting the getIcyMetadata() function or unusual request patterns indicative of SSRF attempts. Administrators should monitor logs for anomalous outbound connections and unusual internal service access. If patching is delayed, consider isolating the WordPress server in a segmented network zone with minimal access to internal resources. Additionally, review and harden internal services to require strong authentication and avoid trusting requests originating from the WordPress server. Regularly update all plugins and themes to the latest versions and subscribe to vulnerability advisories from the plugin vendor and WordPress security sources. Employing runtime application self-protection (RASP) solutions can also help detect and block SSRF exploitation attempts in real time.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-03T23:11:51.326Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6944f80919341fe18889df14

Added to database: 12/19/2025, 7:00:25 AM

Last enriched: 2/27/2026, 10:39:54 AM

Last updated: 3/25/2026, 3:55:46 AM

Views: 114

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses