Skip to main content

CVE-2025-8013: CWE-918 Server-Side Request Forgery (SSRF) in quttera Quttera Web Malware Scanner

Low
VulnerabilityCVE-2025-8013cvecve-2025-8013cwe-918
Published: Fri Aug 15 2025 (08/15/2025, 06:40:40 UTC)
Source: CVE Database V5
Vendor/Project: quttera
Product: Quttera Web Malware Scanner

Description

The Quttera Web Malware Scanner plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.5.1.41 via the 'RunExternalScan' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

AI-Powered Analysis

AILast updated: 08/15/2025, 07:03:41 UTC

Technical Analysis

CVE-2025-8013 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Quttera Web Malware Scanner plugin for WordPress, affecting all versions up to and including 3.5.1.41. SSRF vulnerabilities allow an attacker to induce the vulnerable server to make HTTP requests to arbitrary domains or IP addresses, potentially including internal or protected network resources that are otherwise inaccessible externally. In this case, the vulnerability exists in the 'RunExternalScan' function of the plugin. Exploitation requires the attacker to have authenticated access with Administrator-level privileges or higher within the WordPress environment. Once exploited, the attacker can make the web application send crafted requests to internal services, potentially querying sensitive information or modifying data on those internal endpoints. The vulnerability is classified under CWE-918, which covers SSRF issues. The CVSS v3.1 base score is 3.8, indicating a low severity primarily due to the requirement for high privileges (Administrator) and no user interaction needed. There are no known exploits in the wild at the time of publication, and no patches or fixes have been linked yet. The vulnerability could be leveraged in complex attack chains, especially in environments where internal services are trusted and exposed only to the local network, as SSRF can bypass network segmentation controls by using the vulnerable application as a proxy for internal reconnaissance or attacks.

Potential Impact

For European organizations using WordPress with the Quttera Web Malware Scanner plugin, this vulnerability presents a risk primarily in environments where multiple administrators or privileged users have access to the WordPress backend. An attacker who compromises or already holds Administrator credentials can exploit this SSRF to pivot into internal networks, potentially accessing sensitive internal services such as intranet portals, internal APIs, or database management interfaces that are not exposed externally. This could lead to unauthorized information disclosure or manipulation of internal data. Although the CVSS score is low, the impact can be significant in organizations with critical internal services protected by network segmentation rather than strong authentication. European organizations in sectors such as finance, healthcare, government, and critical infrastructure, which often rely on internal web services and have strict data protection requirements under GDPR, could face compliance and operational risks if internal data is exposed or altered. The requirement for Administrator-level access limits the threat to insider attackers or those who have already breached the administrative perimeter, but the SSRF could facilitate lateral movement and escalation within the network.

Mitigation Recommendations

1. Immediate mitigation should include restricting Administrator-level access to trusted personnel only and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Network segmentation should be reviewed and hardened to ensure that internal services are not accessible or modifiable even if SSRF is exploited; for example, internal services should require authentication independent of network location. 3. Monitor and audit WordPress administrator activities and logs for unusual or unauthorized use of the 'RunExternalScan' function or unexpected outbound requests from the web server. 4. Disable or remove the Quttera Web Malware Scanner plugin if it is not essential, or replace it with alternative malware scanning solutions that do not have this vulnerability. 5. Apply principle of least privilege for WordPress roles, ensuring that only necessary users have Administrator rights. 6. Implement web application firewall (WAF) rules to detect and block suspicious SSRF patterns or outbound requests originating from the WordPress server. 7. Stay alert for official patches or updates from the vendor and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-22T00:27:02.341Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689ed815ad5a09ad0063745b

Added to database: 8/15/2025, 6:47:49 AM

Last enriched: 8/15/2025, 7:03:41 AM

Last updated: 8/22/2025, 12:34:57 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats