CVE-2024-13879 – WordPress Stream Plugin SSRF

The following table lists the changes that have been made to the
CVE-2024-13879 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Feb. 17, 2025

    Action Type Old Value New Value
    Added Description The Stream plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 4.0.2 due to insufficient validation on the webhook feature. This makes it possible for authenticated attackers, with administrator-level access and above, to make web requests to arbitrary locations originating from the web application which can be used to query and modify information from internal services.
    Added CVSS V3.1 AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
    Added CWE CWE-918
    Added Reference https://github.com/xwp/stream/blob/develop/changelog.md#410—january-15-2025
    Added Reference https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3226637%40stream&new=3226637%40stream&sfp_email=&sfph_mail=
    Added Reference https://www.wordfence.com/threat-intel/vulnerabilities/id/8680ad0a-7513-408d-a62d-ffb0b0e7addb?source=cve
Share the Post:

Related Posts