CVE-2025-30964

5.4 MEDIUM

📋 TL;DR

This SSRF vulnerability in the Photography WordPress theme allows attackers to make the server send unauthorized requests to internal systems. It affects all WordPress sites using Photography theme versions up to 7.5.2. Attackers can potentially access internal services that should not be exposed.

💻 Affected Systems

Products:
  • WordPress Photography Theme
Versions: n/a through 7.5.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with Photography theme enabled. The vulnerability exists in theme functionality.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal admin panels, cloud metadata services, or other internal systems, potentially leading to data exfiltration or further network compromise.

🟠

Likely Case

Attackers scan internal networks, access internal APIs, or perform port scanning of internal systems from the vulnerable server.

🟢

If Mitigated

With proper network segmentation and egress filtering, impact is limited to the server itself with minimal data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SSRF vulnerabilities are commonly exploited and tools exist for automated exploitation. The Patchstack reference suggests public exploit details are available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.5.3 or later

Vendor Advisory: https://patchstack.com/database/wordpress/theme/photography/vulnerability/wordpress-photography-theme-7-5-2-server-side-request-forgery-ssrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Check if Photography theme update is available. 4. Update to version 7.5.3 or later. 5. Clear any caching plugins.

🔧 Temporary Workarounds

Disable vulnerable theme

all

Switch to a different WordPress theme until patch can be applied

Web Application Firewall rule

all

Block SSRF patterns at WAF level

🧯 If You Can't Patch

  • Implement strict egress filtering on the server to block outbound requests to internal IP ranges
  • Deploy a web application firewall with SSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Appearance > Themes > Photography theme version. If version is 7.5.2 or earlier, you are vulnerable.

Check Version:

wp theme list --field=name,status,version | grep photography

Verify Fix Applied:

After updating, verify Photography theme version shows 7.5.3 or later in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from web server to internal IPs
  • Requests to metadata services (169.254.169.254, etc.)
  • Multiple failed connection attempts to internal services

Network Indicators:

  • Web server making unexpected outbound connections to internal networks
  • Traffic to cloud metadata endpoints from web server

SIEM Query:

source="web_server_logs" AND (dest_ip IN (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, 169.254.169.254) OR uri CONTAINS "internal" OR uri CONTAINS "localhost")

🔗 References

📤 Share & Export