CVE-2023-27451

7.2 HIGH

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in the Darren Cooney Instant Images WordPress plugin. It allows authenticated attackers to make arbitrary HTTP requests from the vulnerable server, potentially accessing internal systems. WordPress sites using Instant Images plugin version 5.1.0.2 or earlier are affected.

💻 Affected Systems

Products:
  • Darren Cooney Instant Images WordPress plugin
Versions: <= 5.1.0.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access (subscriber role or higher).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, exfiltrate sensitive data, or pivot to internal network systems, potentially leading to full network compromise.

🟠

Likely Case

Attackers scan internal networks, access metadata services (like AWS/Azure instance metadata), or perform port scanning of internal systems.

🟢

If Mitigated

With proper network segmentation and egress filtering, impact is limited to the web server's network segment.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated WordPress user access. Public proof-of-concept code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.1.0.3

Vendor Advisory: https://patchstack.com/database/vulnerability/instant-images/wordpress-instant-images-5-1-0-1-auth-server-side-request-forgery-ssrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Instant Images plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 5.1.0.3+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the Instant Images plugin until patched.

wp plugin deactivate instant-images

Restrict User Roles

all

Limit plugin access to trusted administrators only.

🧯 If You Can't Patch

  • Implement network egress filtering to restrict outbound HTTP requests from web servers
  • Deploy web application firewall (WAF) rules to detect and block SSRF patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Instant Images version. If version is 5.1.0.2 or lower, you are vulnerable.

Check Version:

wp plugin get instant-images --field=version

Verify Fix Applied:

Verify plugin version is 5.1.0.3 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from web server to internal IPs
  • Requests to metadata services (169.254.169.254, 169.254.170.2)
  • Multiple HTTP requests to unusual ports from same user session

Network Indicators:

  • Web server making HTTP requests to internal network segments
  • Requests to cloud metadata endpoints from web server

SIEM Query:

source="web_server_logs" AND (dest_ip=169.254.169.254 OR dest_ip=169.254.170.2 OR dest_ip IN [internal_ranges]) AND user_agent LIKE "%WordPress%"

🔗 References

📤 Share & Export