Skip to main content

CVE-2025-48294: CWE-918 Server-Side Request Forgery (SSRF) in Kerfred FG Drupal to WordPress

Medium
VulnerabilityCVE-2025-48294cvecve-2025-48294cwe-918
Published: Wed Jul 16 2025 (07/16/2025, 10:36:54 UTC)
Source: CVE Database V5
Vendor/Project: Kerfred
Product: FG Drupal to WordPress

Description

Server-Side Request Forgery (SSRF) vulnerability in Kerfred FG Drupal to WordPress allows Server Side Request Forgery. This issue affects FG Drupal to WordPress: from n/a through 3.90.0.

AI-Powered Analysis

AILast updated: 07/16/2025, 11:19:06 UTC

Technical Analysis

CVE-2025-48294 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Kerfred FG Drupal to WordPress migration plugin, affecting versions up to 3.90.0. SSRF vulnerabilities occur when an attacker can manipulate a server-side application to make HTTP requests to arbitrary domains or internal systems, potentially bypassing network access controls. In this case, the vulnerability allows an authenticated user with high privileges (as indicated by the CVSS vector requiring PR:H) to induce the plugin to send crafted requests to internal or external resources. The vulnerability is categorized under CWE-918, which specifically addresses SSRF issues. The CVSS score of 4.4 (medium severity) reflects that exploitation requires high privileges and has a high attack complexity, with no user interaction needed. The impact on confidentiality and integrity is low, and availability is not affected. No known exploits are currently in the wild, and no patches have been linked yet. The plugin is used to migrate content from Drupal to WordPress, which is a common task for organizations transitioning CMS platforms. The SSRF could be leveraged to access internal services, potentially leading to information disclosure or further network reconnaissance, especially in segmented environments where internal services are not directly accessible externally. The scope is marked as changed (S:C), indicating that exploitation could affect resources beyond the vulnerable component itself, such as internal network resources. Given the nature of the plugin, the vulnerability is exploitable only by authenticated users with elevated privileges, limiting the attack surface but still posing a risk if such credentials are compromised or misused.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to those using the Kerfred FG Drupal to WordPress plugin for CMS migration or content synchronization. The SSRF could allow attackers to pivot from the web server to internal network services, potentially exposing sensitive internal APIs, metadata services, or other protected resources. This could lead to information leakage or facilitate further attacks such as lateral movement or privilege escalation within the network. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, could face compliance risks if internal data is exposed. The requirement for high privileges reduces the likelihood of exploitation by external attackers but raises concerns about insider threats or compromised administrative accounts. Additionally, the changed scope suggests that the vulnerability could impact systems beyond the plugin itself, increasing the potential damage. European organizations relying on Drupal and WordPress for their web presence and content management should assess their exposure, especially if they use this migration tool. The absence of known exploits provides a window for proactive mitigation before active exploitation occurs.

Mitigation Recommendations

1. Restrict access to the FG Drupal to WordPress plugin to only trusted administrators and limit the number of users with high privileges to reduce the risk of credential compromise. 2. Monitor and audit usage of the plugin, looking for unusual or unauthorized migration activities that could indicate exploitation attempts. 3. Implement network segmentation and firewall rules to restrict the web server's ability to make arbitrary outbound requests, especially to internal services that should not be accessible. 4. Apply strict input validation and sanitization on any user-controllable parameters related to the plugin's request functionality, if custom configurations or extensions are used. 5. Stay updated with vendor advisories and apply patches promptly once they become available. 6. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block SSRF patterns targeting internal IP ranges or suspicious endpoints. 7. Conduct internal penetration testing focusing on SSRF vectors in the plugin to identify and remediate potential exploitation paths. 8. Review and harden authentication mechanisms to prevent unauthorized access to privileged accounts that can exploit this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-19T14:13:37.939Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 687782f9a83201eaacd97908

Added to database: 7/16/2025, 10:46:17 AM

Last enriched: 7/16/2025, 11:19:06 AM

Last updated: 8/9/2025, 12:24:13 AM

Views: 26

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats