CVE-2024-32819
WordPress vulnerability analysis and mitigation

Overview

A Server-Side Request Forgery (SSRF) vulnerability has been identified in the Culqi WordPress plugin, affecting versions up to and including 3.0.14. The vulnerability was discovered by Majed Refaea and was assigned CVE-2024-32819. The issue was publicly disclosed on April 22, 2024, and affects the plugin's getmerchants function ([Patchstack](https://patchstack.com/database/vulnerability/culqi-checkout/wordpress-culqi-plugin-3-0-14-server-side-request-forgery-ssrf-vulnerability?s_id=cve), WPScan).

Technical details

The vulnerability exists in the getmerchants function of the Culqi WordPress plugin. It has been assigned a CVSS 3.1 base score of 4.9 (Medium) with the vector string CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N. The vulnerability is classified under CWE-918 (Server-Side Request Forgery) ([Patchstack](https://patchstack.com/database/vulnerability/culqi-checkout/wordpress-culqi-plugin-3-0-14-server-side-request-forgery-ssrf-vulnerability?s_id=cve)).

Impact

This vulnerability allows authenticated attackers with subscriber-level access or higher to make web requests to arbitrary locations originating from the web application. This capability can be exploited to query and modify information from internal services (WPScan).

Mitigation and workarounds

The vulnerability has been fixed in version 3.0.15 of the Culqi plugin. Users are advised to update to this version or later to remediate the vulnerability. Patchstack has also issued a virtual patch to mitigate this issue by blocking potential attacks until users can update to the fixed version (Patchstack).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management