CVE-2025-8678: WP Crontrol Authenticated (Administrator+) plugin vulnerable to Blind Server-Side Request Forgery
The WP Crontrol plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in versions 1.17.0 to 1.19.1 via the wp_remote_request()
function. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
It is not possible for a user without Administrator level access to exploit this weakness. It is not possible for an Administrator performing an attack to see the HTTP response to the request to their chosen URL, nor is it possible for them to time the response.
References
- github.com/advisories/GHSA-35c5-67fm-cpcp
- github.com/johnbillion/wp-crontrol
- github.com/johnbillion/wp-crontrol/commit/b085bd306588d7a9baed82de37f9d1818deafc44
- github.com/johnbillion/wp-crontrol/releases/tag/1.19.2
- github.com/johnbillion/wp-crontrol/security/advisories/GHSA-35c5-67fm-cpcp
- nvd.nist.gov/vuln/detail/CVE-2025-8678
Code Behaviors & Features
Detect and mitigate CVE-2025-8678 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →