Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30914: Server-Side Request Forgery (SSRF) in Roxnor Metform

0
Unknown
VulnerabilityCVE-2025-30914cvecve-2025-30914
Published: Thu Mar 27 2025 (03/27/2025, 10:55:54 UTC)
Source: CVE Database V5
Vendor/Project: Roxnor
Product: Metform

Description

Server-Side Request Forgery (SSRF) vulnerability in Roxnor Metform metform allows Server Side Request Forgery.This issue affects Metform: from n/a through <= 3.9.2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 00:43:24 UTC

Technical Analysis

CVE-2025-30914 identifies a Server-Side Request Forgery (SSRF) vulnerability in the Roxnor Metform plugin, specifically affecting versions up to 3.9.2. SSRF vulnerabilities occur when an attacker can manipulate a server to send crafted requests to internal or external resources that the server can access but the attacker normally cannot. In this case, the Metform plugin, which is widely used in WordPress sites to create interactive forms, improperly validates or sanitizes user-supplied URLs or input parameters that trigger server-side HTTP requests. This allows an attacker to coerce the server into making arbitrary HTTP requests, potentially accessing internal services, metadata endpoints, or other protected resources within the server's network. The vulnerability was published on March 27, 2025, with no CVSS score assigned yet and no known active exploits. The lack of authentication requirements for exploitation increases the attack surface, as any unauthenticated user can potentially trigger SSRF attacks. The plugin’s widespread use in WordPress ecosystems means many websites could be vulnerable if they have not updated to a fixed version. The absence of patch links suggests that a fix may not yet be publicly available, emphasizing the need for temporary mitigations. SSRF can be leveraged to bypass firewalls, scan internal networks, access cloud metadata services, or pivot to other attacks such as remote code execution or data exfiltration if combined with other vulnerabilities.

Potential Impact

The impact of this SSRF vulnerability is significant for organizations using the Roxnor Metform plugin in their WordPress environments. Attackers exploiting this flaw can make the vulnerable server initiate arbitrary HTTP requests, potentially accessing internal network resources that are otherwise inaccessible externally. This can lead to unauthorized disclosure of sensitive information such as internal IP addresses, cloud instance metadata (e.g., AWS, Azure, GCP), or internal APIs. In some cases, SSRF can be a stepping stone to more severe attacks like remote code execution or lateral movement within a network. For organizations, this can result in data breaches, service disruptions, and loss of customer trust. The vulnerability’s presence in a popular WordPress plugin increases the likelihood of widespread exploitation attempts once a public exploit is developed. Additionally, the absence of authentication requirements means attackers can scan and exploit vulnerable sites en masse. This threat is particularly concerning for organizations with sensitive internal services behind firewalls or cloud metadata endpoints that rely on network segmentation for security.

Mitigation Recommendations

To mitigate CVE-2025-30914, organizations should first verify if they are using Roxnor Metform versions 3.9.2 or earlier and upgrade to the latest patched version as soon as it becomes available. Until a patch is released, administrators should consider disabling or restricting the Metform plugin functionality that triggers server-side requests, especially if it accepts user-supplied URLs or input that can be manipulated. Implementing web application firewall (WAF) rules to detect and block suspicious SSRF patterns can provide temporary protection. Network-level controls should be enforced to restrict outbound HTTP requests from web servers to only trusted destinations, minimizing the risk of SSRF exploitation. Additionally, internal services and cloud metadata endpoints should be protected by network segmentation and access controls to prevent unauthorized access even if SSRF is exploited. Monitoring logs for unusual outbound requests from web servers can help detect exploitation attempts early. Finally, educating developers and administrators about SSRF risks and secure coding practices can reduce future vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-03-26T09:21:45.625Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7332e6bfc5ba1def0c97

Added to database: 4/1/2026, 7:34:10 PM

Last enriched: 4/2/2026, 12:43:24 AM

Last updated: 4/6/2026, 9:23:36 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses