Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5818: CWE-918 Server-Side Request Forgery (SSRF) in krasenslavov Featured Image Plus – Quick & Bulk Edit with Unsplash

0
Medium
VulnerabilityCVE-2025-5818cvecve-2025-5818cwe-918
Published: Wed Jul 23 2025 (07/23/2025, 02:24:38 UTC)
Source: CVE Database V5
Vendor/Project: krasenslavov
Product: Featured Image Plus – Quick & Bulk Edit with Unsplash

Description

The Featured Image Plus – Quick & Bulk Edit with Unsplash plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.6.4 via the fip_get_image_options() function. This makes it possible for authenticated attackers, with administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 15:36:46 UTC

Technical Analysis

CVE-2025-5818 is a Server-Side Request Forgery (SSRF) vulnerability identified in the WordPress plugin Featured Image Plus – Quick & Bulk Edit with Unsplash, developed by krasenslavov. The vulnerability exists in all versions up to and including 1.6.4, specifically within the fip_get_image_options() function. SSRF vulnerabilities allow attackers to abuse a vulnerable server to send crafted requests to arbitrary internal or external resources. In this case, an attacker with authenticated administrator-level access or higher can leverage the plugin's functionality to make web requests originating from the web application server to arbitrary locations. This can enable attackers to query internal services, potentially exposing sensitive information or modifying internal data that is not normally accessible from outside the network. The vulnerability requires no user interaction but does require high privileges, limiting exploitation to trusted users with admin rights. The CVSS 3.1 base score is 5.5, reflecting medium severity, with vector AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N, indicating network attack vector, low attack complexity, high privileges required, no user interaction, scope change, and limited confidentiality and integrity impact without availability impact. No patches or exploit code are currently publicly available, but the vulnerability poses a risk to WordPress sites using this plugin, especially in environments where internal services are sensitive or critical. The vulnerability was published on July 23, 2025, and assigned by Wordfence.

Potential Impact

The primary impact of CVE-2025-5818 is the potential for attackers with administrator privileges to perform SSRF attacks, which can lead to unauthorized internal network reconnaissance and data access or modification. This can compromise confidentiality by exposing sensitive internal endpoints or services that are not externally accessible. Integrity may be affected if the attacker uses SSRF to modify internal service data or configurations. Although availability impact is not indicated, the ability to query or manipulate internal services could indirectly lead to service disruptions. Organizations with complex internal networks or sensitive internal APIs are at higher risk. Since exploitation requires administrator-level access, the threat is limited to insider threats or compromised admin accounts, but the consequences can be significant in terms of lateral movement and internal data exposure. The vulnerability could be leveraged to bypass network segmentation and firewall protections, increasing the attack surface. Given the widespread use of WordPress and the popularity of image management plugins, many organizations worldwide could be affected if they use this plugin and do not apply mitigations.

Mitigation Recommendations

To mitigate CVE-2025-5818, organizations should first verify if they are using the Featured Image Plus – Quick & Bulk Edit with Unsplash plugin and identify the version in use. Since no official patch is currently available, immediate mitigation steps include restricting administrator access to trusted personnel only and monitoring admin activities closely. Implement network-level controls such as egress filtering and internal firewall rules to limit the web server's ability to make arbitrary outbound requests, especially to sensitive internal services. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SSRF patterns. Review and harden internal service authentication and access controls to reduce the impact of potential SSRF exploitation. Consider disabling or removing the plugin if it is not essential. Monitor logs for unusual outbound requests originating from the web server. Once a patch is released, apply it promptly. Additionally, conduct regular security audits of WordPress plugins and maintain least privilege principles for admin accounts to reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-06T16:49:08.190Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68804d50ad5a09ad00065fd4

Added to database: 7/23/2025, 2:47:44 AM

Last enriched: 2/27/2026, 3:36:46 PM

Last updated: 3/22/2026, 10:00:04 PM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses