CVE-2024-10705
Published: 26 January 2025
Description
The Multiple Page Generator Plugin – MPG plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 4.0.5 via the 'mpg_download_file_by_link' function. This makes it possible for authenticated attackers, with editor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Security Summary
CVE-2024-10705 is a Server-Side Request Forgery (SSRF) vulnerability, classified under CWE-918, affecting the Multiple Page Generator Plugin (MPG) for WordPress in all versions up to and including 4.0.5. The flaw resides in the 'mpg_download_file_by_link' function, which fails to properly validate user-supplied URLs, allowing the plugin to initiate requests to arbitrary domains from the server's context. The vulnerability carries a CVSS v3.1 base score of 5.4 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N), indicating medium severity with low privileges required for exploitation.
Authenticated attackers with editor-level access or higher can exploit this vulnerability to trick the WordPress server into making unauthorized web requests to internal or external locations. This enables potential querying or modification of sensitive information from internal services that are not directly accessible from the internet, such as metadata endpoints or administrative interfaces, without requiring user interaction.
Advisories reference a patch committed in WordPress plugin trac changeset 3205550, which addresses the issue in versions beyond 4.0.5. Wordfence's threat intelligence page provides additional details on the vulnerability, recommending immediate updates to mitigate risks for affected installations.
Details
- CWE(s)