CVE-2022-1977

7.2 HIGH

📋 TL;DR

This vulnerability in the Import Export All WordPress Images, Users & Post Types plugin allows administrators to perform Blind Server-Side Request Forgery (SSRF) attacks. Attackers can make the WordPress server send HTTP requests to internal systems that shouldn't be accessible from outside. Only WordPress sites using vulnerable versions of this specific plugin are affected.

💻 Affected Systems

Products:
  • Import Export All WordPress Images, Users & Post Types WordPress plugin
Versions: All versions before 6.5.3
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin-level access to exploit. The vulnerability exists in the import functionality that accepts URLs.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, scan internal networks, interact with cloud metadata services to obtain credentials, or use the WordPress server as a proxy for attacks against other systems.

🟠

Likely Case

Internal network reconnaissance, accessing internal APIs or services that shouldn't be exposed, potentially leading to data exfiltration or further lateral movement.

🟢

If Mitigated

Limited impact if network segmentation prevents access to sensitive internal systems and outbound firewall rules restrict HTTP requests from web servers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials. The vulnerability is well-documented in security advisories with technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.5.3 and later

Vendor Advisory: https://wpscan.com/vulnerability/1b640519-75e1-48cb-944e-b9bff9de6d3d

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find 'Import Export All WordPress Images, Users & Post Types'. 4. Click 'Update Now' if available. 5. Alternatively, download version 6.5.3+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable the vulnerable plugin

all

Temporarily deactivate the plugin until patching is possible

wp plugin deactivate import-export-all-wordpress-images-users-post-types

Restrict admin access

all

Limit admin accounts to only necessary personnel and implement strong authentication

🧯 If You Can't Patch

  • Implement network segmentation to prevent WordPress servers from accessing internal systems
  • Configure web application firewall rules to block SSRF patterns and restrict outbound HTTP requests from web servers

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins → Import Export All WordPress Images, Users & Post Types → Version number

Check Version:

wp plugin get import-export-all-wordpress-images-users-post-types --field=version

Verify Fix Applied:

Verify plugin version is 6.5.3 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from WordPress server to internal IP ranges
  • Multiple failed import attempts with URL parameters
  • Admin user performing import operations with external URLs

Network Indicators:

  • HTTP requests from WordPress server to internal network segments (10.x.x.x, 172.16.x.x, 192.168.x.x)
  • Requests to cloud metadata endpoints (169.254.169.254)

SIEM Query:

source="wordpress.log" AND ("import" OR "export") AND url=* AND (dst_ip=10.* OR dst_ip=172.16.* OR dst_ip=192.168.* OR dst_ip=169.254.169.254)

🔗 References

📤 Share & Export