The Seraphinite Accelerator plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.20.52 via the OnAdminApi_HtmlCheck function. This makes it possible for authenticated attackers, with subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
History

Thu, 16 Jan 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared S-sols
S-sols seraphinite Accelerator
Weaknesses CWE-918
CPEs cpe:2.3:a:s-sols:seraphinite_accelerator:*:*:*:*:*:wordpress:*:*
Vendors & Products S-sols
S-sols seraphinite Accelerator

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-02-28T06:46:47.074Z

Updated: 2024-08-01T18:40:21.352Z

Reserved: 2024-02-15T20:38:44.481Z

Link: CVE-2024-1568

cve-icon Vulnrichment

Updated: 2024-08-01T18:40:21.352Z

cve-icon NVD

Status : Analyzed

Published: 2024-02-28T07:15:08.713

Modified: 2025-01-16T15:34:31.447

Link: CVE-2024-1568

cve-icon Redhat

No data.