First published: Tue Feb 18 2025(Updated: )
The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to Limited Server-Side Request Forgery in all versions up to, and including, 5.9.4.2 via the pm_upload_image function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to download and view images, as well as validating if a non-image file exists, both on local or remote hosts.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
ProfileGrid – User Profiles, Groups and Communities | <=5.9.4.2 | |
Metagauss ProfileGrid | <5.9.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13741 is classified as a moderate severity vulnerability due to the potential for authenticated attackers to exploit it.
To fix CVE-2024-13741, update the ProfileGrid plugin for WordPress to version 5.9.4.3 or later.
CVE-2024-13741 affects users of the ProfileGrid – User Profiles, Groups and Communities plugin for WordPress, specifically those using versions up to 5.9.4.2.
CVE-2024-13741 enables limited server-side request forgery (SSRF) attacks that can be exploited by authenticated users.
Currently, there are no recommended workarounds for CVE-2024-13741, and updating the plugin is advised as the best solution.