WordPress BulletProof Security Plugin <= 0.51 is vulnerable to Server Side Request Forgery (SSRF)

Low priority No impactful threat
<= 0.51Vulnerable version(s)
0.51.1Patched version

Get the fastest vulnerability mitigation with Patchstack!

Get started

Risks

CVSS 4.3

Vulnerabilities like this one are used in mass-exploit campaigns. Attackers use these to attack thousands of websites at a time, regardless of traffic size or popularity. Learn more.

As immediate action, update the affected plugin. If you're unable to do so, ask your hosting provider or web developer for help.

User Interaction Required

While this vulnerability can be initiated by the role shown in "Required Privilege", successful exploitation requires a privileged user to perform an action — such as clicking a malicious link, visiting a crafted page, or submitting a form.

4.3

Server Side Request Forgery (SSRF)

This could allow a malicious actor to cause a website to execute website requests to an arbitrary domain of the attacker. This could allow a malicious actor to find sensitive information of other services running on the system.

CVSS score is a way to evaluate and rank reported vulnerabilities in a standardized and repeatable way but which is not ideal for WordPress.

Solutions

This security issue has a low severity impact and is unlikely to be exploited.

Update to version 0.51.1 or later.

Update to version 0.51.1 or later to resolve the vulnerability. Patchstack users can turn on auto-update for vulnerable plugins only.

Details

Have additional information or questions about this entry? Let us know.

Weekly WordPress security intelligence delivered to your inbox.