CVE-2025-67623

9.1 CRITICAL

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in the 6Storage Rentals WordPress plugin. Attackers can exploit this to make the vulnerable server send unauthorized requests to internal or external systems. All WordPress sites running 6Storage Rentals plugin versions up to and including 2.19.9 are affected.

💻 Affected Systems

Products:
  • 6Storage Rentals WordPress Plugin
Versions: n/a through <= 2.19.9
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: WordPress plugin vulnerability; requires plugin to be installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through internal service enumeration, credential theft from metadata services, or remote code execution via chained attacks.

🟠

Likely Case

Data exfiltration from internal services, port scanning of internal networks, or abuse of the server as a proxy for malicious activities.

🟢

If Mitigated

Limited impact with proper network segmentation and egress filtering, potentially only revealing internal service banners.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SSRF vulnerabilities typically have low exploitation complexity, especially when unauthenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: >2.19.9

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/6storage-rentals/vulnerability/wordpress-6storage-rentals-plugin-2-19-9-server-side-request-forgery-ssrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find '6Storage Rentals' plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and remove plugin until patched version is released.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily deactivate the vulnerable plugin until patched version is available.

wp plugin deactivate 6storage-rentals

Network Egress Filtering

all

Implement firewall rules to restrict outbound HTTP/HTTPS requests from web servers to only necessary external services.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block SSRF patterns in requests
  • Restrict server network access to internal services using firewall rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for '6Storage Rentals' version <=2.19.9

Check Version:

wp plugin list --name=6storage-rentals --field=version

Verify Fix Applied:

Verify plugin version is >2.19.9 in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from web server to internal IP addresses or unexpected domains
  • Multiple failed connection attempts to internal services from web server process

Network Indicators:

  • Web server making HTTP requests to internal network segments (10.x.x.x, 172.16.x.x, 192.168.x.x)
  • Unusual traffic patterns from web server to cloud metadata services (169.254.169.254)

SIEM Query:

source="web_server_logs" AND (dest_ip=~"10\.\d+\.\d+\.\d+" OR dest_ip=~"172\.(1[6-9]|2[0-9]|3[0-1])\.\d+\.\d+" OR dest_ip=~"192\.168\.\d+\.\d+")

🔗 References

📤 Share & Export