CVE-2022-40700
📋 TL;DR
This CVE describes a Server-Side Request Forgery (SSRF) vulnerability affecting multiple WordPress plugins and themes. It allows attackers to make unauthorized requests from the vulnerable server to internal or external systems. Users of the listed WordPress plugins and themes are affected.
💻 Affected Systems
- Montonio for WooCommerce
- Wpopal Core Features
- ArcStone wp-amo
- WooVirtualWallet
- WooVIP
- WooSupply
- Theme Minifier
- Styles
- WordPress Page Builder - Qards
- PHPFreeChat
- Custom Login Admin Front-end CSS
- CSS Adder By Agence-Press
- Confirm Data
- AMP Toolbox
- Admin CSS MU
📦 What is this software?
Admin Css Mu by Millionclues
Amo For Wp Membership Management by Arcstone
Css Adder by Agence Press
Custom Login Admin Front End Css by Millionclues
Qards by Designmodo
Styles by Paulclark
Theme Minifier by Squidesma
Woosupply by Longwatchstudio
Woovip by Longwatchstudio
Woovirtualwallet by Longwatchstudio
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access internal services, exfiltrate sensitive data, perform port scanning of internal networks, or chain with other vulnerabilities to achieve remote code execution.
Likely Case
Unauthorized access to internal services, data exfiltration from internal systems, or using the vulnerable server as a proxy for attacks against other systems.
If Mitigated
Limited impact if network segmentation restricts internal access and external requests are filtered, though the vulnerability still exists.
🎯 Exploit Status
Based on CWE-918 and CVSS 8.2, exploitation is likely straightforward. Some references indicate unauthenticated exploitation is possible.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Varies by product - check individual vendor advisories
Vendor Advisory: See provided Patchstack references for each affected product
Restart Required: No
Instructions:
1. Identify which affected plugins/themes are installed. 2. Check WordPress plugin/theme updates. 3. Update to latest versions. 4. Verify updates applied successfully.
🔧 Temporary Workarounds
Disable affected plugins/themes
allTemporarily disable vulnerable plugins/themes until patches can be applied
wp plugin deactivate [plugin-name]
wp theme deactivate [theme-name]
Network restrictions
linuxImplement network controls to restrict outbound requests from web servers
iptables -A OUTPUT -p tcp --dport 80 -j DROP
iptables -A OUTPUT -p tcp --dport 443 -j DROP
🧯 If You Can't Patch
- Remove affected plugins/themes completely from production systems
- Implement web application firewall rules to block SSRF patterns
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel for installed plugins/themes and compare with affected list
Check Version:
wp plugin list --fields=name,version --format=csv
Verify Fix Applied:
Verify plugin/theme versions are updated beyond vulnerable versions listed
📡 Detection & Monitoring
Log Indicators:
- Unusual outbound HTTP requests from web server
- Requests to internal IP addresses or localhost
- Multiple failed connection attempts to various ports
Network Indicators:
- Web server making unexpected outbound connections
- Traffic to internal services from web server
SIEM Query:
source="web_server_logs" AND (dest_ip=127.0.0.1 OR dest_ip=10.* OR dest_ip=172.16.* OR dest_ip=192.168.*) AND method="GET" OR method="POST"
🔗 References
- https://patchstack.com/database/vulnerability/admin-css-mu/wordpress-admin-css-mu-plugin-2-6-server-side-request-forgery-ssrf-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/amp-toolbox/wordpress-amp-toolbox-plugin-2-1-1-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/confirm-data/wordpress-confirm-data-plugin-1-0-7-unauth-server-side-request-forgery-ssrf-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/css-adder-by-agence-press/wordpress-css-adder-by-agene-press-plugin-1-5-0-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/custom-login-admin-front-end-css-with-multisite-support/wordpress-custom-login-admin-front-end-css-plugin-1-4-1-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/montonio-for-woocommerce/wordpress-montonio-for-woocommerce-plugin-6-0-1-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/phpfreechat/wordpress-phpfreechat-plugin-0-2-8-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/qards-free/wordpress-wordpress-page-builder-qards-plugin-1-0-5-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/styles/wordpress-styles-plugin-1-2-3-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/theme-minifier/wordpress-theme-minifier-plugin-2-0-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/woosupply/wordpress-woosupply-plugin-1-2-2-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/woovip/wordpress-woovip-plugin-1-4-4-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/woovirtualwallet/wordpress-woovirtualwallet-plugin-2-2-1-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/wp-amo/wordpress-amo-for-wp-plugin-4-6-6-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/wpopal-core-features/wordpress-wpopal-core-features-plugin-1-5-7-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/admin-css-mu/wordpress-admin-css-mu-plugin-2-6-server-side-request-forgery-ssrf-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/amp-toolbox/wordpress-amp-toolbox-plugin-2-1-1-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/confirm-data/wordpress-confirm-data-plugin-1-0-7-unauth-server-side-request-forgery-ssrf-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/css-adder-by-agence-press/wordpress-css-adder-by-agene-press-plugin-1-5-0-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/custom-login-admin-front-end-css-with-multisite-support/wordpress-custom-login-admin-front-end-css-plugin-1-4-1-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/montonio-for-woocommerce/wordpress-montonio-for-woocommerce-plugin-6-0-1-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/phpfreechat/wordpress-phpfreechat-plugin-0-2-8-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/qards-free/wordpress-wordpress-page-builder-qards-plugin-1-0-5-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/styles/wordpress-styles-plugin-1-2-3-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/theme-minifier/wordpress-theme-minifier-plugin-2-0-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/woosupply/wordpress-woosupply-plugin-1-2-2-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/woovip/wordpress-woovip-plugin-1-4-4-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/woovirtualwallet/wordpress-woovirtualwallet-plugin-2-2-1-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/wp-amo/wordpress-amo-for-wp-plugin-4-6-6-server-side-request-forgery-ssrf?_s_id=cve
- https://patchstack.com/database/vulnerability/wpopal-core-features/wordpress-wpopal-core-features-plugin-1-5-7-server-side-request-forgery-ssrf?_s_id=cve