Skip to main content

CVE-2025-8680: CWE-918 Server-Side Request Forgery (SSRF) in bplugins B Slider- Gutenberg Slider Block for WP

Medium
VulnerabilityCVE-2025-8680cvecve-2025-8680cwe-918
Published: Fri Aug 15 2025 (08/15/2025, 02:24:23 UTC)
Source: CVE Database V5
Vendor/Project: bplugins
Product: B Slider- Gutenberg Slider Block for WP

Description

The B Slider- Gutenberg Slider Block for WP plugin for WordPress is vulnerable to Server-Side Request Forgery in version less than, or equal to, 2.0.0 via the fs_api_request function. This makes it possible for authenticated attackers, with subscriber-level access and above to make web requests to arbitrary locations originating from the web application which can be used to query and modify information from internal services.

AI-Powered Analysis

AILast updated: 08/15/2025, 02:49:00 UTC

Technical Analysis

CVE-2025-8680 is a Server-Side Request Forgery (SSRF) vulnerability identified in the B Slider- Gutenberg Slider Block for WordPress plugin, developed by bplugins. This vulnerability affects all versions up to and including 2.0.0. The flaw exists in the fs_api_request function, which improperly handles user-supplied input to make web requests. An authenticated attacker with subscriber-level privileges or higher can exploit this vulnerability to induce the web application to send HTTP requests to arbitrary internal or external locations. SSRF vulnerabilities are particularly dangerous because they allow attackers to bypass network access controls, potentially accessing internal services that are not exposed externally. In this case, the attacker can query and possibly modify information from internal services by leveraging the plugin's request functionality. The vulnerability has a CVSS 3.1 base score of 4.3, indicating a medium severity level. The attack vector is network-based with low attack complexity, requiring privileges equivalent to a subscriber role but no user interaction. The impact primarily affects confidentiality, as the attacker can access internal resources, but does not directly affect integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability falls under CWE-918, which covers SSRF issues where an application is tricked into making unintended requests. Given the widespread use of WordPress and its plugins, this vulnerability poses a risk to websites using the affected plugin version, especially if attackers can gain subscriber-level access through other means such as phishing or weak credentials.

Potential Impact

For European organizations, the impact of this SSRF vulnerability can be significant, especially for those relying on WordPress websites with the B Slider plugin installed. Attackers exploiting this flaw can access internal services that are otherwise protected by network segmentation or firewalls, potentially exposing sensitive internal APIs, databases, or administrative interfaces. This could lead to unauthorized data disclosure, reconnaissance for further attacks, or indirect manipulation of internal systems if the internal services are vulnerable. Although the vulnerability does not directly allow code execution or denial of service, the ability to query internal resources can facilitate lateral movement or data exfiltration. Organizations in sectors such as finance, healthcare, government, and critical infrastructure, which often host sensitive data behind internal networks, are particularly at risk. The requirement for subscriber-level authentication means that attackers need some level of access, but subscriber roles are commonly assigned to registered users or can be obtained via compromised credentials, making exploitation feasible. The medium severity rating suggests a moderate risk, but the potential for internal network exposure elevates the concern for organizations with strict data protection requirements under GDPR and other regulations.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should take the following specific actions: 1) Immediately identify and inventory WordPress installations using the B Slider- Gutenberg Slider Block plugin, focusing on versions 2.0.0 and below. 2) Apply updates or patches as soon as they become available from the vendor or plugin maintainers. In the absence of official patches, consider disabling or removing the plugin temporarily to eliminate the attack surface. 3) Restrict subscriber-level user privileges by reviewing user roles and permissions, ensuring that only trusted users have subscriber or higher access. 4) Implement network-level controls such as egress filtering and internal segmentation to limit the ability of web servers to make arbitrary outbound requests, thereby reducing SSRF impact. 5) Monitor web server logs and application logs for unusual outbound requests or patterns indicative of SSRF exploitation attempts. 6) Employ Web Application Firewalls (WAFs) with rules designed to detect and block SSRF payloads targeting the vulnerable plugin endpoints. 7) Educate users about credential security to prevent unauthorized access that could lead to exploitation. These measures, combined, will reduce the risk and potential impact of this vulnerability in European environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-06T18:49:06.064Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689e9c51ad5a09ad00615fb6

Added to database: 8/15/2025, 2:32:49 AM

Last enriched: 8/15/2025, 2:49:00 AM

Last updated: 8/15/2025, 2:49:00 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats