CVE-2025-47635

5.5 MEDIUM

📋 TL;DR

This Server-Side Request Forgery (SSRF) vulnerability in WPWebinarSystem WebinarPress allows attackers to make unauthorized requests from the vulnerable server to internal or external systems. It affects WordPress sites running WebinarPress plugin versions up to 1.33.27. Attackers could potentially access internal services or perform port scanning through the vulnerable server.

💻 Affected Systems

Products:
  • WPWebinarSystem WebinarPress
Versions: n/a through 1.33.27
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with WebinarPress plugin installed and active.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker accesses internal services, exfiltrates sensitive data, or performs port scanning to map internal network infrastructure.

🟠

Likely Case

Attacker accesses internal services or performs limited port scanning, potentially exposing internal network information.

🟢

If Mitigated

Limited impact due to network segmentation, firewall rules, or lack of internal services to target.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

SSRF vulnerabilities typically have low exploitation complexity once the vulnerable endpoint is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.33.28 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/wp-webinarsystem/vulnerability/wordpress-webinarpress-1-33-27-server-side-request-forgery-ssrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find WebinarPress plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable WebinarPress Plugin

all

Temporarily disable the vulnerable plugin until patched.

wp plugin deactivate wp-webinarsystem

Network Segmentation

all

Restrict outbound HTTP/HTTPS requests from web server to only necessary external services.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block SSRF patterns
  • Restrict outbound network access from web servers using firewall rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for WebinarPress version.

Check Version:

wp plugin get wp-webinarsystem --field=version

Verify Fix Applied:

Verify WebinarPress plugin version is 1.33.28 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from web server to internal IPs
  • Requests to localhost or internal services from web application

Network Indicators:

  • HTTP requests from web server to unexpected internal destinations
  • Port scanning patterns originating from web server

SIEM Query:

source="web_server_logs" AND (dest_ip=10.0.0.0/8 OR dest_ip=172.16.0.0/12 OR dest_ip=192.168.0.0/16 OR dest_ip=127.0.0.1) AND uri CONTAINS "webinarpress"

🔗 References

📤 Share & Export