CVE-2022-1751
📋 TL;DR
The Skitter Slideshow WordPress plugin contains a Server-Side Request Forgery (SSRF) vulnerability that allows unauthenticated attackers to make arbitrary web requests from the vulnerable server. This can be used to query internal services, potentially exposing sensitive information or enabling further attacks. All WordPress sites using Skitter Slideshow versions up to 2.5.2 are affected.
💻 Affected Systems
- WordPress Skitter Slideshow Plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access internal services, retrieve sensitive data from cloud metadata services, perform port scanning of internal networks, or chain with other vulnerabilities to achieve remote code execution.
Likely Case
Information disclosure from internal services, reconnaissance of internal network structure, or abuse of the server as a proxy for attacks against other systems.
If Mitigated
Limited impact if network segmentation prevents access to sensitive internal services and external requests are filtered.
🎯 Exploit Status
Simple HTTP requests to /wp-content/plugins/wp-skitter-slideshow/image.php with crafted parameters can trigger SSRF. Public exploit details are available in security advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.5.3 or later
Vendor Advisory: https://plugins.trac.wordpress.org/browser/wp-skitter-slideshow/trunk/image.php
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Skitter Slideshow and update to version 2.5.3 or later. 4. Alternatively, delete the plugin if not needed.
🔧 Temporary Workarounds
Block access to image.php
allUse web server configuration to block direct access to the vulnerable file
# For Apache: add to .htaccess
<Files "image.php">
Order Allow,Deny
Deny from all
</Files>
# For Nginx: add to server block
location ~* /wp-content/plugins/wp-skitter-slideshow/image\.php$ {
deny all;
}
Disable plugin
allTemporarily disable the Skitter Slideshow plugin
# Via WordPress admin: Plugins > Installed Plugins > Skitter Slideshow > Deactivate
🧯 If You Can't Patch
- Remove the Skitter Slideshow plugin entirely if not essential
- Implement network controls to restrict outbound connections from web servers to internal services
🔍 How to Verify
Check if Vulnerable:
Check if /wp-content/plugins/wp-skitter-slideshow/image.php exists and is accessible without authentication. Test with a request to a controlled external service.
Check Version:
# Check WordPress plugin version via database
SELECT * FROM wp_options WHERE option_name LIKE '%skitter%';
Verify Fix Applied:
Verify plugin version is 2.5.3 or later in WordPress admin panel. Test that image.php no longer accepts arbitrary URLs or returns appropriate error.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to /wp-content/plugins/wp-skitter-slideshow/image.php with URL parameters
- Unusual outbound connections from web server to internal IPs or cloud metadata services
Network Indicators:
- Web server making unexpected HTTP requests to internal services or external domains
- Traffic patterns showing the server acting as a proxy
SIEM Query:
source="web_server_logs" AND uri="/wp-content/plugins/wp-skitter-slideshow/image.php" AND (query_string CONTAINS "url=" OR query_string CONTAINS "http")