CVE-2025-5818: CWE-918 Server-Side Request Forgery (SSRF) in krasenslavov Featured Image Plus – Quick & Bulk Edit with Unsplash
The Featured Image Plus – Quick & Bulk Edit with Unsplash plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.6.4 via the fip_get_image_options() function. This makes it possible for authenticated attackers, with administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
AI Analysis
Technical Summary
CVE-2025-5818 is a Server-Side Request Forgery (SSRF) vulnerability identified in the WordPress plugin Featured Image Plus – Quick & Bulk Edit with Unsplash, developed by krasenslavov. The vulnerability exists in all versions up to and including 1.6.4, specifically within the fip_get_image_options() function. SSRF vulnerabilities allow attackers to abuse a vulnerable server to send crafted requests to arbitrary internal or external resources. In this case, an attacker with authenticated administrator-level access or higher can leverage the plugin's functionality to make web requests originating from the web application server to arbitrary locations. This can enable attackers to query internal services, potentially exposing sensitive information or modifying internal data that is not normally accessible from outside the network. The vulnerability requires no user interaction but does require high privileges, limiting exploitation to trusted users with admin rights. The CVSS 3.1 base score is 5.5, reflecting medium severity, with vector AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N, indicating network attack vector, low attack complexity, high privileges required, no user interaction, scope change, and limited confidentiality and integrity impact without availability impact. No patches or exploit code are currently publicly available, but the vulnerability poses a risk to WordPress sites using this plugin, especially in environments where internal services are sensitive or critical. The vulnerability was published on July 23, 2025, and assigned by Wordfence.
Potential Impact
The primary impact of CVE-2025-5818 is the potential for attackers with administrator privileges to perform SSRF attacks, which can lead to unauthorized internal network reconnaissance and data access or modification. This can compromise confidentiality by exposing sensitive internal endpoints or services that are not externally accessible. Integrity may be affected if the attacker uses SSRF to modify internal service data or configurations. Although availability impact is not indicated, the ability to query or manipulate internal services could indirectly lead to service disruptions. Organizations with complex internal networks or sensitive internal APIs are at higher risk. Since exploitation requires administrator-level access, the threat is limited to insider threats or compromised admin accounts, but the consequences can be significant in terms of lateral movement and internal data exposure. The vulnerability could be leveraged to bypass network segmentation and firewall protections, increasing the attack surface. Given the widespread use of WordPress and the popularity of image management plugins, many organizations worldwide could be affected if they use this plugin and do not apply mitigations.
Mitigation Recommendations
To mitigate CVE-2025-5818, organizations should first verify if they are using the Featured Image Plus – Quick & Bulk Edit with Unsplash plugin and identify the version in use. Since no official patch is currently available, immediate mitigation steps include restricting administrator access to trusted personnel only and monitoring admin activities closely. Implement network-level controls such as egress filtering and internal firewall rules to limit the web server's ability to make arbitrary outbound requests, especially to sensitive internal services. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SSRF patterns. Review and harden internal service authentication and access controls to reduce the impact of potential SSRF exploitation. Consider disabling or removing the plugin if it is not essential. Monitor logs for unusual outbound requests originating from the web server. Once a patch is released, apply it promptly. Additionally, conduct regular security audits of WordPress plugins and maintain least privilege principles for admin accounts to reduce risk.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2025-5818: CWE-918 Server-Side Request Forgery (SSRF) in krasenslavov Featured Image Plus – Quick & Bulk Edit with Unsplash
Description
The Featured Image Plus – Quick & Bulk Edit with Unsplash plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.6.4 via the fip_get_image_options() function. This makes it possible for authenticated attackers, with administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-5818 is a Server-Side Request Forgery (SSRF) vulnerability identified in the WordPress plugin Featured Image Plus – Quick & Bulk Edit with Unsplash, developed by krasenslavov. The vulnerability exists in all versions up to and including 1.6.4, specifically within the fip_get_image_options() function. SSRF vulnerabilities allow attackers to abuse a vulnerable server to send crafted requests to arbitrary internal or external resources. In this case, an attacker with authenticated administrator-level access or higher can leverage the plugin's functionality to make web requests originating from the web application server to arbitrary locations. This can enable attackers to query internal services, potentially exposing sensitive information or modifying internal data that is not normally accessible from outside the network. The vulnerability requires no user interaction but does require high privileges, limiting exploitation to trusted users with admin rights. The CVSS 3.1 base score is 5.5, reflecting medium severity, with vector AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N, indicating network attack vector, low attack complexity, high privileges required, no user interaction, scope change, and limited confidentiality and integrity impact without availability impact. No patches or exploit code are currently publicly available, but the vulnerability poses a risk to WordPress sites using this plugin, especially in environments where internal services are sensitive or critical. The vulnerability was published on July 23, 2025, and assigned by Wordfence.
Potential Impact
The primary impact of CVE-2025-5818 is the potential for attackers with administrator privileges to perform SSRF attacks, which can lead to unauthorized internal network reconnaissance and data access or modification. This can compromise confidentiality by exposing sensitive internal endpoints or services that are not externally accessible. Integrity may be affected if the attacker uses SSRF to modify internal service data or configurations. Although availability impact is not indicated, the ability to query or manipulate internal services could indirectly lead to service disruptions. Organizations with complex internal networks or sensitive internal APIs are at higher risk. Since exploitation requires administrator-level access, the threat is limited to insider threats or compromised admin accounts, but the consequences can be significant in terms of lateral movement and internal data exposure. The vulnerability could be leveraged to bypass network segmentation and firewall protections, increasing the attack surface. Given the widespread use of WordPress and the popularity of image management plugins, many organizations worldwide could be affected if they use this plugin and do not apply mitigations.
Mitigation Recommendations
To mitigate CVE-2025-5818, organizations should first verify if they are using the Featured Image Plus – Quick & Bulk Edit with Unsplash plugin and identify the version in use. Since no official patch is currently available, immediate mitigation steps include restricting administrator access to trusted personnel only and monitoring admin activities closely. Implement network-level controls such as egress filtering and internal firewall rules to limit the web server's ability to make arbitrary outbound requests, especially to sensitive internal services. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SSRF patterns. Review and harden internal service authentication and access controls to reduce the impact of potential SSRF exploitation. Consider disabling or removing the plugin if it is not essential. Monitor logs for unusual outbound requests originating from the web server. Once a patch is released, apply it promptly. Additionally, conduct regular security audits of WordPress plugins and maintain least privilege principles for admin accounts to reduce risk.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-06T16:49:08.190Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68804d50ad5a09ad00065fd4
Added to database: 7/23/2025, 2:47:44 AM
Last enriched: 2/27/2026, 3:36:46 PM
Last updated: 3/22/2026, 10:00:04 PM
Views: 86
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.