First published: Fri Oct 28 2022(Updated: )
The Web Stories plugin for WordPress is vulnerable to Server-Side Request Forgery in versions up to, and including 1.24.0 due to insufficient validation of URLs supplied via the 'url' parameter found via the /v1/hotlink/proxy REST API Endpoint. This made it possible for authenticated users to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Credit: security@wordfence.com security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
<1.25.0 | ||
Google Web Stories | <1.25.0 |
https://github.com/GoogleForCreators/web-stories-wp/commit/3ad2099f95155d658624ffac2e34ce0da739e34b
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3708 has been classified as a high severity vulnerability due to its potential to allow server-side request forgery.
To fix CVE-2022-3708, update the Web Stories plugin to version 1.25.0 or later.
Authenticated users of the WordPress Web Stories plugin up to version 1.24.0 are affected by CVE-2022-3708.
CVE-2022-3708 affects versions of the Web Stories plugin for WordPress prior to 1.25.0.
As of now, there are no public reports confirming active exploitation of CVE-2022-3708, but awareness and mitigation are advised.