CVE-2024-13845

The Gravity Forms WebHooks plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.6.0 via the 'process_feed' method of the GF_Webhooks class This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rocketgenius:gravity_forms_webhooks:*:*:*:*:*:wordpress:*:*

History

19 May 2025, 11:53

Type Values Removed Values Added
First Time Rocketgenius gravity Forms Webhooks
Rocketgenius
References () https://www.gravityforms.com/blog/brand-new-release-webhooks-add-on-1-7/ - () https://www.gravityforms.com/blog/brand-new-release-webhooks-add-on-1-7/ - Release Notes
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/9311b20b-daad-408f-a1a0-d1e42573ab97?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/9311b20b-daad-408f-a1a0-d1e42573ab97?source=cve - Third Party Advisory
Summary
  • (es) El complemento Gravity Forms WebHooks para WordPress es vulnerable a Server-Side Request Forgery en todas las versiones hasta la 1.6.0 incluida, a través del método 'process_feed' de la clase GF_Webhooks. Esto hace posible que atacantes autenticados, con acceso de nivel de administrador y superior, realicen solicitudes web a ubicaciones arbitrarias que se originan en la aplicación web y pueden usarse para consultar y modificar información de servicios internos.
CPE cpe:2.3:a:rocketgenius:gravity_forms_webhooks:*:*:*:*:*:wordpress:*:*

01 May 2025, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 05:15

Updated : 2025-05-19 11:53


NVD link : CVE-2024-13845

Mitre link : CVE-2024-13845

CVE.ORG link : CVE-2024-13845


JSON object : View

Products Affected

rocketgenius

  • gravity_forms_webhooks
CWE
CWE-918

Server-Side Request Forgery (SSRF)