CVE-2024-1812
📋 TL;DR
The Everest Forms WordPress plugin has a Server-Side Request Forgery (SSRF) vulnerability that allows unauthenticated attackers to make arbitrary web requests from the vulnerable server. This can be used to query or modify internal services accessible from the web server. All WordPress sites using Everest Forms versions 2.0.7 and earlier are affected.
💻 Affected Systems
- Everest Forms WordPress Plugin
📦 What is this software?
Everest Forms by Wpeverest
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access internal services, sensitive data, or perform actions on internal systems, potentially leading to data exfiltration, internal network compromise, or lateral movement.
Likely Case
Attackers scan internal networks, access metadata services, or interact with internal APIs to gather information about the infrastructure.
If Mitigated
With proper network segmentation and egress filtering, impact is limited to external requests only.
🎯 Exploit Status
SSRF vulnerabilities are commonly exploited and require minimal technical skill when weaponized.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.0.8 or later
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3049743/everest-forms
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Everest Forms and click 'Update Now'. 4. Alternatively, download version 2.0.8+ from WordPress.org and replace the plugin files.
🔧 Temporary Workarounds
Disable Everest Forms Plugin
allTemporarily disable the vulnerable plugin until patching is possible.
wp plugin deactivate everest-forms
Web Application Firewall Rule
allBlock requests containing suspicious 'font_url' parameter patterns.
🧯 If You Can't Patch
- Implement network egress filtering to restrict outbound connections from web servers.
- Use web application firewall to block SSRF patterns and restrict internal network access.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Everest Forms version. If version is 2.0.7 or earlier, you are vulnerable.
Check Version:
wp plugin get everest-forms --field=version
Verify Fix Applied:
Verify Everest Forms version is 2.0.8 or later in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual outbound HTTP requests from web server to internal IPs or metadata endpoints
- Requests to Everest Forms endpoints with 'font_url' parameter containing unusual values
Network Indicators:
- Web server making unexpected outbound HTTP requests to internal services or cloud metadata endpoints
SIEM Query:
source="web_server_logs" AND (uri_path="/wp-content/plugins/everest-forms/" AND parameters CONTAINS "font_url")
🔗 References
- https://plugins.trac.wordpress.org/changeset/3049743/everest-forms
- https://www.wordfence.com/threat-intel/vulnerabilities/id/d4561441-d147-4c02-a837-c1656e17627d?source=cve
- https://plugins.trac.wordpress.org/changeset/3049743/everest-forms
- https://www.wordfence.com/threat-intel/vulnerabilities/id/d4561441-d147-4c02-a837-c1656e17627d?source=cve