CVE-2025-49984
BaseFortify
Publication date: 2025-06-20
Last updated on: 2026-04-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-918 | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Server-Side Request Forgery (SSRF) in the WordPress PowerPress Podcasting plugin up to version 11.12.11. It allows a malicious actor with at least contributor-level privileges to make the affected website send HTTP requests to arbitrary domains controlled by the attacker. This can potentially expose sensitive information from other services running on the same system. [1]
How can this vulnerability impact me? :
Exploitation of this vulnerability can lead to exposure of sensitive information from other services on the same system as the affected website. Although the severity is rated low (CVSS 4.9) and exploitation is considered unlikely, attackers could automate attempts to exploit this vulnerability. If compromised, professional incident response or server-side malware scanning is recommended since plugin-based scanners may be unreliable. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this SSRF vulnerability involves monitoring for unusual HTTP requests initiated by the affected PowerPress Podcasting plugin to arbitrary external domains. Since exploitation requires contributor-level privileges, reviewing logs for unexpected outbound requests from the server to suspicious domains may help. Professional incident response or server-side malware scanning is recommended, as plugin-based malware scanners may be unreliable due to tampering. Specific commands are not provided in the resources. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include applying Patchstack's virtual patching (vPatching) technology, which can neutralize the vulnerability without impacting performance, even though no official patch is available yet. Additionally, restricting contributor-level access to trusted users and monitoring for suspicious activity is advised. Seeking professional incident response support is recommended if compromise is suspected. [1]