WordPress CoBlocks Plugin < 3.1.12 is vulnerable to Server Side Request Forgery (SSRF)

Low priority Mitigation available
< 3.1.12Vulnerable version(s)
3.1.12Fixed version

Get the fastest vulnerability mitigation with Patchstack!

Get started

Risks

CVSS 4.9

4.9

Server Side Request Forgery (SSRF)

This could allow a malicious actor to cause a website to execute website requests to an arbitrary domain of the attacker. This could allow a malicious actor to find sensitive information of other services running on the system.

CVSS score is a way to evaluate and rank reported vulnerabilities in a standardized and repeatable way but which is not ideal for WordPress.

Solutions

This security issue has a low severity impact and is unlikely to be exploited.

Automatically mitigate vulnerabilities and keep your websites safe.

Patchstack has issued a mitigation rule to block any attacks until you have updated to a fixed version.

Get the fastest vulnerability mitigation with Patchstack!

Get started

Update to version 3.1.12 or later.

Update to version 3.1.12 or later to remove the vulnerability. Patchstack users can turn on auto-update for vulnerable plugins only.

Details

Have additional information or questions about this entry? Let us know.

Timeline

Early warning sent out to Patchstack customers

23 Jul, 2024

Published by Patchstack

23 Jul, 2024

Weekly WordPress security intelligence delivered to your inbox.