CVE-2025-8680

4.3 MEDIUM

📋 TL;DR

The B Slider WordPress plugin versions ≤2.0.0 contain a Server-Side Request Forgery (SSRF) vulnerability in the fs_api_request function. Authenticated attackers with subscriber-level access or higher can force the server to make arbitrary web requests, potentially accessing internal services. This affects WordPress sites using vulnerable versions of the B Slider plugin.

💻 Affected Systems

Products:
  • B Slider - Gutenberg Slider Block for WP
Versions: ≤ 2.0.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with vulnerable plugin version and at least one user with subscriber role or higher.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could query internal services, access sensitive data, perform port scanning, or interact with cloud metadata services to escalate privileges.

🟠

Likely Case

Attackers scan internal networks, access internal APIs, or interact with services like AWS metadata endpoints to gather information.

🟢

If Mitigated

With proper network segmentation and egress filtering, impact is limited to information disclosure from reachable internal services.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access but only subscriber-level privileges. Exploitation requires understanding of SSRF techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: > 2.0.0

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3343487%40b-slider&new=3343487%40b-slider&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'B Slider - Gutenberg Slider Block for WP'. 4. Click 'Update Now' if available. 5. If no update appears, manually download latest version from WordPress plugin repository and replace files.

🔧 Temporary Workarounds

Disable Plugin

WordPress

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate b-slider

Restrict User Registration

WordPress

Prevent new subscriber accounts from being created

Settings → General → Membership: Uncheck 'Anyone can register'

🧯 If You Can't Patch

  • Implement network egress filtering to block outbound requests from web servers to internal networks
  • Apply WordPress role restrictions to limit subscriber capabilities

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → B Slider version. If version ≤2.0.0, vulnerable.

Check Version:

wp plugin get b-slider --field=version

Verify Fix Applied:

Verify plugin version >2.0.0 in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from web server to internal IPs
  • Multiple HTTP requests to metadata services (169.254.169.254)

Network Indicators:

  • Web server making unexpected outbound connections to internal services
  • HTTP requests with unusual User-Agent strings from web server IP

SIEM Query:

source="web_server_logs" dest_ip IN (RFC1918_ranges, 169.254.169.254, localhost) AND user_agent="WordPress"

🔗 References

📤 Share & Export