CVE-2023-36679

7.1 HIGH

📋 TL;DR

This Server-Side Request Forgery (SSRF) vulnerability in the Spectra WordPress plugin allows attackers to make unauthorized requests from the vulnerable server to internal or external systems. It affects WordPress sites using Spectra (formerly Ultimate Addons for Gutenberg) from all versions up to 2.6.6. Attackers could potentially access internal services, perform port scanning, or interact with cloud metadata services.

💻 Affected Systems

Products:
  • WordPress Spectra plugin (formerly Ultimate Addons for Gutenberg)
Versions: All versions up to and including 2.6.6
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the Spectra plugin active. The vulnerability is in the plugin itself, not WordPress core.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, cloud metadata (potentially obtaining credentials), perform port scanning, or use the server as a proxy for attacks against other systems.

🟠

Likely Case

Information disclosure from internal services, limited port scanning, or using the server to make requests to external systems that appear legitimate.

🟢

If Mitigated

Limited impact if network segmentation restricts outbound connections and internal services are properly secured with authentication.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SSRF vulnerabilities are commonly exploited and weaponized. While no public PoC is confirmed, the vulnerability type suggests exploitation is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6.7 and later

Vendor Advisory: https://patchstack.com/database/vulnerability/ultimate-addons-for-gutenberg/wordpress-spectra-plugin-2-6-6-server-side-request-forgery-ssrf-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Spectra' plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 2.6.7+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable Spectra Plugin

all

Temporarily disable the vulnerable plugin until patching is possible

wp plugin deactivate ultimate-addons-for-gutenberg

Restrict Outbound Network Access

linux

Use firewall rules to limit the server's ability to make outbound requests to internal networks

iptables -A OUTPUT -p tcp --dport 80 -j DROP
iptables -A OUTPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Implement network segmentation to restrict the web server from accessing internal services
  • Use a Web Application Firewall (WAF) with SSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Spectra version. If version is 2.6.6 or lower, you are vulnerable.

Check Version:

wp plugin get ultimate-addons-for-gutenberg --field=version

Verify Fix Applied:

Verify Spectra plugin version is 2.6.7 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from web server to internal IPs
  • Requests to cloud metadata endpoints (169.254.169.254, etc.)
  • Multiple failed connection attempts to various ports

Network Indicators:

  • Web server making unexpected outbound connections
  • Requests to internal services from web server IP

SIEM Query:

source="web_server_logs" AND (dest_ip=169.254.169.254 OR dest_ip IN [RFC1918_ranges]) AND user_agent CONTAINS "WordPress"

🔗 References

📤 Share & Export