CVE-2025-10861

Popup · Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers plugin for WordPress

A high-severity Server-Side Request Forgery (SSRF) vulnerability has been identified in a WordPress popup builder plugin.

Executive summary

A high-severity Server-Side Request Forgery (SSRF) vulnerability has been identified in a WordPress popup builder plugin. This flaw allows an unauthenticated attacker to trick the website's server into making unauthorized requests to internal network resources or external services. Successful exploitation could lead to the exposure of sensitive internal data and further compromise of the network infrastructure.

Vulnerability

The vulnerability is a Server-Side Request Forgery (SSRF). It exists because the plugin improperly validates user-supplied input that is used to construct a URL for a server-side request. An attacker can craft a malicious request to the plugin, forcing the web server to send requests to arbitrary destinations, including internal services that are not normally accessible from the internet. This could be used to scan the internal network, interact with internal APIs, or access sensitive information from cloud provider metadata services.

Business impact

This vulnerability is rated as high severity with a CVSS score of 7.5. Exploitation can lead to significant business impacts, including the breach of confidential information, such as internal network topology, service banners, and potentially cloud infrastructure credentials. An attacker could use the compromised server as a pivot point to launch further attacks against the internal network, jeopardizing the integrity and confidentiality of corporate data and systems. This poses a direct risk to operational security and could result in reputational damage and regulatory non-compliance.

Remediation

Immediate Action: Immediately update the "Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers" plugin to the latest version provided by the vendor (a version greater than 2). If the plugin is not essential for business operations, consider deactivating and removing it to eliminate the attack surface.

Proactive Monitoring: Monitor egress network traffic from the web server for unusual outbound connections, particularly to internal IP address ranges (e.g., 10.0.0.0/8, 192.168.0.0/16) and cloud metadata endpoints (e.g., 169.254.169.254). Review web server access logs for suspicious requests targeting the plugin's functionality that may contain URLs or IP addresses in the parameters.

Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules designed to detect and block SSRF attack patterns. Additionally, enforce strict egress filtering rules on the server's host-based or network firewall to limit the server's ability to initiate connections to internal services and unknown external destinations.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 7.5) of this vulnerability and its potential for exposing internal network resources, immediate action is required. We strongly recommend that all system owners identify instances of the vulnerable plugin and apply the vendor-provided security update without delay. Although this CVE is not currently on the CISA KEV list, its high score and the prevalence of WordPress make it a prime target for opportunistic attackers. Prioritize patching to mitigate the risk of a security breach.