CVE-2022-1751

7.2 HIGH

📋 TL;DR

The Skitter Slideshow WordPress plugin contains a Server-Side Request Forgery (SSRF) vulnerability that allows unauthenticated attackers to make arbitrary web requests from the vulnerable server. This can be used to query internal services, potentially exposing sensitive information or enabling further attacks. All WordPress sites using Skitter Slideshow versions up to 2.5.2 are affected.

💻 Affected Systems

Products:
  • WordPress Skitter Slideshow Plugin
Versions: All versions up to and including 2.5.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the plugin to be installed and activated on WordPress. The vulnerable image.php file is accessible without authentication.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, retrieve sensitive data from cloud metadata services, perform port scanning of internal networks, or chain with other vulnerabilities to achieve remote code execution.

🟠

Likely Case

Information disclosure from internal services, reconnaissance of internal network structure, or abuse of the server as a proxy for attacks against other systems.

🟢

If Mitigated

Limited impact if network segmentation prevents access to sensitive internal services and external requests are filtered.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP requests to /wp-content/plugins/wp-skitter-slideshow/image.php with crafted parameters can trigger SSRF. Public exploit details are available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.5.3 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/wp-skitter-slideshow/trunk/image.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Skitter Slideshow and update to version 2.5.3 or later. 4. Alternatively, delete the plugin if not needed.

🔧 Temporary Workarounds

Block access to image.php

all

Use web server configuration to block direct access to the vulnerable file

# For Apache: add to .htaccess
<Files "image.php">
    Order Allow,Deny
    Deny from all
</Files>
# For Nginx: add to server block
location ~* /wp-content/plugins/wp-skitter-slideshow/image\.php$ {
    deny all;
}

Disable plugin

all

Temporarily disable the Skitter Slideshow plugin

# Via WordPress admin: Plugins > Installed Plugins > Skitter Slideshow > Deactivate

🧯 If You Can't Patch

  • Remove the Skitter Slideshow plugin entirely if not essential
  • Implement network controls to restrict outbound connections from web servers to internal services

🔍 How to Verify

Check if Vulnerable:

Check if /wp-content/plugins/wp-skitter-slideshow/image.php exists and is accessible without authentication. Test with a request to a controlled external service.

Check Version:

# Check WordPress plugin version via database
SELECT * FROM wp_options WHERE option_name LIKE '%skitter%';

Verify Fix Applied:

Verify plugin version is 2.5.3 or later in WordPress admin panel. Test that image.php no longer accepts arbitrary URLs or returns appropriate error.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /wp-content/plugins/wp-skitter-slideshow/image.php with URL parameters
  • Unusual outbound connections from web server to internal IPs or cloud metadata services

Network Indicators:

  • Web server making unexpected HTTP requests to internal services or external domains
  • Traffic patterns showing the server acting as a proxy

SIEM Query:

source="web_server_logs" AND uri="/wp-content/plugins/wp-skitter-slideshow/image.php" AND (query_string CONTAINS "url=" OR query_string CONTAINS "http")

🔗 References

📤 Share & Export