CVE-2025-47664
📋 TL;DR
This SSRF vulnerability in ThimPress WP Pipes WordPress plugin allows attackers to make unauthorized requests from the server to internal or external systems. It affects all WordPress sites running WP Pipes versions up to 1.4.2. Attackers could potentially access internal services or perform port scanning.
💻 Affected Systems
- ThimPress WP Pipes WordPress Plugin
📦 What is this software?
Wp Pipes by Thimpress
⚠️ Risk & Real-World Impact
Worst Case
Attackers access internal services, exfiltrate sensitive data, or pivot to other internal systems through the compromised server.
Likely Case
Attackers scan internal networks, access metadata services (like AWS IMDS), or make requests to internal APIs.
If Mitigated
Limited to external requests only, with no access to internal resources due to network segmentation.
🎯 Exploit Status
SSRF vulnerabilities typically have low exploitation complexity once the vulnerable endpoint is identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.4.3 or later
Vendor Advisory: https://patchstack.com/database/wordpress/plugin/wp-pipes/vulnerability/wordpress-wp-pipes-1-4-2-server-side-request-forgery-ssrf-vulnerability?_s_id=cve
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find WP Pipes and click 'Update Now'. 4. Verify version is 1.4.3 or higher.
🔧 Temporary Workarounds
Disable WP Pipes Plugin
allTemporarily disable the vulnerable plugin until patched.
wp plugin deactivate wp-pipes
Network Segmentation
allRestrict outbound HTTP/HTTPS requests from web servers to only necessary external services.
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block SSRF patterns
- Restrict server outbound network access using firewall rules
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for WP Pipes version. If version is 1.4.2 or lower, you are vulnerable.
Check Version:
wp plugin get wp-pipes --field=version
Verify Fix Applied:
After updating, verify WP Pipes version shows 1.4.3 or higher in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- Unusual outbound HTTP requests from web server to internal IPs or metadata services
- Requests to unusual ports from web server process
Network Indicators:
- HTTP requests from web server to internal network ranges
- Requests to cloud metadata endpoints (169.254.169.254)
SIEM Query:
source="web_server_logs" AND (dest_ip=10.0.0.0/8 OR dest_ip=172.16.0.0/12 OR dest_ip=192.168.0.0/16 OR dest_ip=169.254.169.254)