CVE-2025-13393
📋 TL;DR
The Featured Image from URL (FIFU) WordPress plugin up to version 5.3.1 has a Server-Side Request Forgery vulnerability in its Elementor widget integration. Authenticated attackers with Contributor-level access or higher can make arbitrary web requests from the server, potentially accessing internal services. This affects WordPress sites using the vulnerable FIFU plugin with Elementor.
💻 Affected Systems
- Featured Image from URL (FIFU) WordPress plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access sensitive internal services, exfiltrate data, or perform internal network reconnaissance leading to further compromise.
Likely Case
Internal service enumeration, information disclosure from internal endpoints, or limited internal network scanning.
If Mitigated
Minimal impact if internal services are properly segmented and authenticated, with only public internet endpoints accessible.
🎯 Exploit Status
Exploitation requires authenticated WordPress user with Contributor role or higher who can access Elementor widgets.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.3.2
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3428744/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find 'Featured Image from URL (FIFU)'. 4. Click 'Update Now' if available, or manually update to version 5.3.2 or later.
🔧 Temporary Workarounds
Disable FIFU Elementor Widget
allTemporarily disable the vulnerable Elementor widget component while awaiting patch.
Edit WordPress theme functions.php and add: add_filter('elementor/widgets/register', function($widgets_manager) { $widgets_manager->unregister('fifu-elementor-widget'); });
Restrict Contributor Permissions
allTemporarily remove Elementor editing capabilities from Contributor-level users.
Use WordPress role management plugin or add to functions.php: remove_cap('contributor', 'edit_posts'); // Adjust as needed for your specific Elementor permissions
🧯 If You Can't Patch
- Implement network segmentation to restrict WordPress server access to internal services
- Apply web application firewall rules to block requests containing 'fifu_input_url' parameter with internal IP addresses
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for FIFU version. If version is 5.3.1 or lower, you are vulnerable.
Check Version:
wp plugin list --name='Featured Image from URL' --field=version (if WP-CLI installed)
Verify Fix Applied:
Verify FIFU plugin version is 5.3.2 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual GET/POST requests to WordPress with 'fifu_input_url' parameter containing internal IPs
- Multiple failed image size validation attempts from same user
Network Indicators:
- Outbound HTTP requests from WordPress server to internal IP ranges
- Unusual port scanning patterns originating from WordPress server
SIEM Query:
source="wordpress.log" AND (fifu_input_url CONTAINS "192.168." OR fifu_input_url CONTAINS "10." OR fifu_input_url CONTAINS "172.16." OR fifu_input_url CONTAINS "127.0.0.1")
🔗 References
- https://plugins.trac.wordpress.org/browser/featured-image-from-url/trunk/elementor/widgets/widget.php#L121
- https://plugins.trac.wordpress.org/browser/featured-image-from-url/trunk/elementor/widgets/widget.php#L94
- https://plugins.trac.wordpress.org/changeset/3428744/
- https://research.cleantalk.org/cve-2025-13393/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/b7115070-b84d-4d69-993a-f512b9f9c081?source=cve