CVE-2025-1662

6.4 MEDIUM

📋 TL;DR

The URL Media Uploader WordPress plugin has a Server-Side Request Forgery (SSRF) vulnerability that allows authenticated attackers with author-level permissions or higher to make arbitrary web requests from the vulnerable server. This can be used to query internal services, potentially exposing sensitive information or modifying data. All WordPress sites using this plugin version 1.0.0 or earlier are affected.

💻 Affected Systems

Products:
  • URL Media Uploader WordPress Plugin
Versions: All versions up to and including 1.0.0
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled and at least one user with author-level permissions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, retrieve sensitive data from internal APIs, perform port scanning of internal networks, or interact with cloud metadata services to obtain credentials.

🟠

Likely Case

Attackers with author accounts could probe internal networks, access internal web applications, or retrieve information from services that shouldn't be publicly accessible.

🟢

If Mitigated

With proper network segmentation and authentication controls, impact is limited to the specific internal services the web server can reach.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with author-level permissions or higher. The vulnerability is in the 'url_media_uploader_url_upload' action handler.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.1 or later

Vendor Advisory: https://wordpress.org/plugins/url-media-uploader/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'URL Media Uploader'. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 1.0.1+ from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate url-media-uploader

Restrict User Roles

all

Remove author-level permissions from untrusted users

🧯 If You Can't Patch

  • Implement network segmentation to restrict web server access to internal services
  • Deploy web application firewall rules to block SSRF patterns in plugin requests

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for URL Media Uploader version 1.0.0 or earlier

Check Version:

wp plugin get url-media-uploader --field=version

Verify Fix Applied:

Verify plugin version is 1.0.1 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from web server to internal IPs
  • Multiple failed media upload attempts via URL
  • Requests to 'url_media_uploader_url_upload' action with unusual URLs

Network Indicators:

  • Web server making unexpected outbound HTTP requests
  • Requests to internal services from web server IP

SIEM Query:

source="web_server_logs" AND (uri="*url_media_uploader_url_upload*" OR user_agent="*WordPress*" AND uri="*upload*" AND (dst_ip="10.*" OR dst_ip="172.16.*" OR dst_ip="192.168.*"))

🔗 References

📤 Share & Export