Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49917: Server-Side Request Forgery (SSRF) in Icegram Icegram Express Pro

0
Medium
VulnerabilityCVE-2025-49917cvecve-2025-49917
Published: Wed Oct 22 2025 (10/22/2025, 14:32:12 UTC)
Source: CVE Database V5
Vendor/Project: Icegram
Product: Icegram Express Pro

Description

Server-Side Request Forgery (SSRF) vulnerability in Icegram Icegram Express Pro email-subscribers-premium allows Server Side Request Forgery.This issue affects Icegram Express Pro: from n/a through <= 5.9.5.

AI-Powered Analysis

AILast updated: 01/20/2026, 20:12:13 UTC

Technical Analysis

CVE-2025-49917 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Icegram Express Pro plugin, specifically affecting versions up to and including 5.9.5. SSRF vulnerabilities occur when an attacker can manipulate a server to send crafted requests to unintended locations, often internal or protected network resources, by exploiting insufficient input validation or improper handling of URLs. In this case, the vulnerability exists in the email-subscribers-premium component of Icegram Express Pro, which is a WordPress plugin used for email marketing and subscriber management. The vulnerability requires an attacker to have high privileges on the WordPress site (e.g., administrator access) but does not require user interaction beyond that. The CVSS vector indicates network attack vector (AV:N), high attack complexity (AC:H), privileges required (PR:H), no user interaction (UI:N), and a scope change (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact on confidentiality and integrity is low, with no impact on availability. This suggests that while the attacker can induce the server to make unauthorized requests, the potential for direct data compromise or system disruption is limited. No known exploits are currently in the wild, and no official patches have been released at the time of publication. However, the vulnerability's presence in a widely used WordPress plugin makes it a concern, especially for organizations relying on Icegram Express Pro for marketing and subscriber engagement. Attackers with administrative access could leverage this SSRF to probe internal networks, access metadata services, or exploit other internal vulnerabilities, potentially leading to further compromise.

Potential Impact

For European organizations, the SSRF vulnerability in Icegram Express Pro poses a moderate risk primarily to the confidentiality and integrity of internal network resources. Organizations using this plugin in their WordPress environments could face unauthorized internal network scanning or data leakage if an attacker gains administrative access. This could facilitate lateral movement within corporate networks or access to sensitive internal services not exposed externally. Although the vulnerability does not directly impact availability, the potential for indirect effects through chained exploits exists. The risk is heightened in sectors with stringent data protection requirements, such as finance, healthcare, and government, where internal network confidentiality is critical. Additionally, organizations with complex internal infrastructures relying on cloud metadata services or internal APIs are at increased risk. The requirement for high privileges limits the threat to scenarios where attackers have already compromised administrative credentials or insider threats exist. Nonetheless, the vulnerability could be exploited as part of a multi-stage attack, increasing the overall risk posture of affected organizations.

Mitigation Recommendations

1. Restrict administrative access to WordPress environments running Icegram Express Pro to trusted personnel only, employing strong authentication mechanisms such as multi-factor authentication (MFA). 2. Monitor and audit administrative activities and plugin usage logs to detect unusual or unauthorized requests that could indicate exploitation attempts. 3. Implement network segmentation and firewall rules to limit the WordPress server's ability to make arbitrary outbound requests, especially to internal network resources and sensitive metadata endpoints. 4. Apply the principle of least privilege to WordPress roles and plugin permissions, minimizing the number of users with high-level access. 5. Stay alert for official patches or updates from Icegram and apply them promptly once available. 6. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SSRF patterns targeting the plugin. 7. Conduct regular vulnerability assessments and penetration testing focusing on SSRF and related web application vulnerabilities within WordPress environments. 8. Educate administrators about the risks of SSRF and the importance of safeguarding credentials and plugin configurations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-11T16:06:59.982Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f8efeb04677bbd794397f4

Added to database: 10/22/2025, 2:53:31 PM

Last enriched: 1/20/2026, 8:12:13 PM

Last updated: 2/6/2026, 3:13:19 PM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats