The Gravity Forms WebHooks plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.6.0 via the 'process_feed' method of the GF_Webhooks class This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Metrics
Affected Vendors & Products
References
History
Thu, 01 May 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 01 May 2025 04:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Gravity Forms WebHooks plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.6.0 via the 'process_feed' method of the GF_Webhooks class This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. | |
Title | Gravity Forms WebHooks <= 1.6.0 - Authenticated (Admin+) Server-Side Request Forgery via Webhook | |
Weaknesses | CWE-918 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-05-01T04:22:57.183Z
Updated: 2025-05-01T13:18:53.896Z
Reserved: 2025-02-06T22:22:14.310Z
Link: CVE-2024-13845

Updated: 2025-05-01T13:18:50.497Z

Status : Awaiting Analysis
Published: 2025-05-01T05:15:51.583
Modified: 2025-05-02T13:53:40.163
Link: CVE-2024-13845

No data.