Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8678: CWE-918 Server-Side Request Forgery (SSRF) in johnbillion WP Crontrol

0
Medium
VulnerabilityCVE-2025-8678cvecve-2025-8678cwe-918
Published: Fri Aug 22 2025 (08/22/2025, 07:24:56 UTC)
Source: CVE Database V5
Vendor/Project: johnbillion
Product: WP Crontrol

Description

The WP Crontrol plugin for WordPress is vulnerable to blind Server-Side Request Forgery in versions 1.17.0 to 1.19.1 via the 'wp_remote_request' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:23:08 UTC

Technical Analysis

CVE-2025-8678 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, affecting the WP Crontrol plugin for WordPress in versions 1.17.0 through 1.19.1. The vulnerability stems from the plugin's use of the 'wp_remote_request' function, which does not properly validate or restrict URLs that can be requested by authenticated users with Administrator-level access. This flaw enables such users to send arbitrary HTTP requests from the WordPress server to internal or external systems. Because the requests originate from the server, attackers can potentially bypass firewall restrictions and access internal services that are otherwise inaccessible externally. The vulnerability is blind SSRF, meaning the attacker does not receive direct response data but can infer information based on side effects or timing. Exploiting this vulnerability requires authenticated access with high privileges, which limits the attack surface but still presents a serious risk if an attacker gains admin credentials. The CVSS v3.1 base score is 5.9 (medium), reflecting the need for authentication and the complexity of exploitation. The vulnerability impacts confidentiality and integrity by allowing unauthorized querying and modification of internal resources. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly.

Potential Impact

The primary impact of CVE-2025-8678 is unauthorized internal network reconnaissance and potential manipulation of internal services via SSRF, which can lead to data leakage, unauthorized data modification, or further lateral movement within the network. Organizations running WordPress sites with the WP Crontrol plugin installed and administrative users compromised are at risk. Attackers could leverage this vulnerability to access sensitive internal APIs, metadata services (such as cloud provider metadata endpoints), or other protected resources, potentially escalating their privileges or exfiltrating confidential information. While the vulnerability does not directly cause denial of service, the compromise of internal services or data integrity could have significant operational and reputational consequences. The requirement for administrator-level access reduces the likelihood of exploitation by external attackers but increases the risk from insider threats or compromised admin accounts. Given WordPress's widespread use globally, the vulnerability could affect a broad range of organizations, including enterprises, government agencies, and small businesses relying on WordPress for content management.

Mitigation Recommendations

To mitigate CVE-2025-8678, organizations should immediately upgrade the WP Crontrol plugin to a version where this vulnerability is fixed once available. Until a patch is released, restrict administrator access to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. Implement network segmentation and firewall rules to limit the WordPress server's ability to make outbound HTTP requests to internal services, thereby reducing the impact of SSRF exploitation. Monitor logs for unusual outbound requests originating from the WordPress server, especially to internal IP ranges or sensitive endpoints. Additionally, consider using Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SSRF patterns. Regularly audit plugin usage and remove unnecessary plugins to reduce the attack surface. Finally, educate administrators about the risks of SSRF and the importance of safeguarding admin credentials.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-06T18:10:40.250Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a81d21ad5a09ad001d27d2

Added to database: 8/22/2025, 7:32:49 AM

Last enriched: 2/26/2026, 5:23:08 PM

Last updated: 3/24/2026, 4:15:58 PM

Views: 137

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses