The Enfold theme for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.0.9 via the 'attachment_id' parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
History

Fri, 28 Feb 2025 02:00:00 +0000

Type Values Removed Values Added
First Time appeared Kriesi
Kriesi enfold
CPEs cpe:2.3:a:kriesi:enfold:*:*:*:*:*:wordpress:*:*
Vendors & Products Kriesi
Kriesi enfold

Tue, 25 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 25 Feb 2025 09:45:00 +0000

Type Values Removed Values Added
Description The Enfold theme for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.0.9 via the 'attachment_id' parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Title Enfold <= 6.0.9 - Authenticated (Subscriber+) Server-Side Request Forgery via attachment_id
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-02-25T09:21:33.873Z

Updated: 2025-02-25T14:37:13.976Z

Reserved: 2025-01-23T20:53:47.459Z

Link: CVE-2024-13695

cve-icon Vulnrichment

Updated: 2025-02-25T14:06:22.008Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-25T10:15:09.940

Modified: 2025-02-28T01:30:32.830

Link: CVE-2024-13695

cve-icon Redhat

No data.