CVE-2025-28963

5.4 MEDIUM

📋 TL;DR

This Server-Side Request Forgery (SSRF) vulnerability in Md Yeasin Ul Haider URL Shortener allows attackers to make the vulnerable server send unauthorized requests to internal or external systems. WordPress sites using this plugin version 3.0.7 or earlier are affected, potentially exposing internal network resources.

💻 Affected Systems

Products:
  • Md Yeasin Ul Haider URL Shortener WordPress Plugin
Versions: n/a through 3.0.7
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with this specific plugin installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, exfiltrate sensitive data, or perform attacks against internal systems by using the vulnerable server as a proxy.

🟠

Likely Case

Information disclosure from internal services, scanning of internal networks, or limited data exfiltration from accessible internal endpoints.

🟢

If Mitigated

Limited impact if network segmentation restricts internal access and external requests are filtered.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SSRF vulnerabilities typically have low exploitation complexity, especially when unauthenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 3.0.7

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/exact-links/vulnerability/wordpress-url-shortener-plugin-3-0-7-server-side-request-forgery-ssrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find 'URL Shortener' plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download latest version from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate url-shortener

Network Restriction

linux

Restrict outbound network access from web server to internal networks

iptables -A OUTPUT -d 10.0.0.0/8 -j DROP
iptables -A OUTPUT -d 172.16.0.0/12 -j DROP
iptables -A OUTPUT -d 192.168.0.0/16 -j DROP

🧯 If You Can't Patch

  • Disable the URL Shortener plugin immediately
  • Implement network segmentation to restrict web server access to internal resources

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > URL Shortener version. If version is 3.0.7 or earlier, you are vulnerable.

Check Version:

wp plugin get url-shortener --field=version

Verify Fix Applied:

Verify plugin version is higher than 3.0.7 in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from web server to internal IPs
  • Requests to localhost or internal services from web application

Network Indicators:

  • Web server making unexpected HTTP requests to internal network ranges
  • Traffic from web server to metadata services (169.254.169.254)

SIEM Query:

source="web_server_logs" AND (dest_ip=10.0.0.0/8 OR dest_ip=172.16.0.0/12 OR dest_ip=192.168.0.0/16 OR dest_ip=127.0.0.0/8) AND http_method IN ("GET", "POST")

🔗 References

📤 Share & Export