CVE-2025-13393

4.3 MEDIUM

📋 TL;DR

The Featured Image from URL (FIFU) WordPress plugin up to version 5.3.1 has a Server-Side Request Forgery vulnerability in its Elementor widget integration. Authenticated attackers with Contributor-level access or higher can make arbitrary web requests from the server, potentially accessing internal services. This affects WordPress sites using the vulnerable FIFU plugin with Elementor.

💻 Affected Systems

Products:
  • Featured Image from URL (FIFU) WordPress plugin
Versions: All versions up to and including 5.3.1
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Elementor plugin and Contributor-level WordPress user permissions or higher.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive internal services, exfiltrate data, or perform internal network reconnaissance leading to further compromise.

🟠

Likely Case

Internal service enumeration, information disclosure from internal endpoints, or limited internal network scanning.

🟢

If Mitigated

Minimal impact if internal services are properly segmented and authenticated, with only public internet endpoints accessible.

🌐 Internet-Facing: MEDIUM - Requires authenticated access but can be exploited from the internet against exposed WordPress sites.
🏢 Internal Only: LOW - The vulnerability itself doesn't directly enable internal-only exploitation beyond what's already possible from the server.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated WordPress user with Contributor role or higher who can access Elementor widgets.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.3.2

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3428744/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find 'Featured Image from URL (FIFU)'. 4. Click 'Update Now' if available, or manually update to version 5.3.2 or later.

🔧 Temporary Workarounds

Disable FIFU Elementor Widget

all

Temporarily disable the vulnerable Elementor widget component while awaiting patch.

Edit WordPress theme functions.php and add: add_filter('elementor/widgets/register', function($widgets_manager) { $widgets_manager->unregister('fifu-elementor-widget'); });

Restrict Contributor Permissions

all

Temporarily remove Elementor editing capabilities from Contributor-level users.

Use WordPress role management plugin or add to functions.php: remove_cap('contributor', 'edit_posts'); // Adjust as needed for your specific Elementor permissions

🧯 If You Can't Patch

  • Implement network segmentation to restrict WordPress server access to internal services
  • Apply web application firewall rules to block requests containing 'fifu_input_url' parameter with internal IP addresses

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for FIFU version. If version is 5.3.1 or lower, you are vulnerable.

Check Version:

wp plugin list --name='Featured Image from URL' --field=version (if WP-CLI installed)

Verify Fix Applied:

Verify FIFU plugin version is 5.3.2 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual GET/POST requests to WordPress with 'fifu_input_url' parameter containing internal IPs
  • Multiple failed image size validation attempts from same user

Network Indicators:

  • Outbound HTTP requests from WordPress server to internal IP ranges
  • Unusual port scanning patterns originating from WordPress server

SIEM Query:

source="wordpress.log" AND (fifu_input_url CONTAINS "192.168." OR fifu_input_url CONTAINS "10." OR fifu_input_url CONTAINS "172.16." OR fifu_input_url CONTAINS "127.0.0.1")

🔗 References

📤 Share & Export