WPScan and america Authorities Nationwide Vulnerability Database printed a discover of a vulnerability found within the HubSpot WordPress plugin. The vulnerability exposes customers of the plugin to a Server Aspect Request Forgery assault.

WPScan Vulnerability Report

The safety researchers at WPScan printed the next report:

“HubSpot < 8.8.15 – Contributor+ Blind SSRF


The plugin doesn’t validate the proxy URL given to the proxy REST endpoint, which may enable customers with the edit_posts functionality (by default contributor and above) to carry out SSRF assaults”

Server Aspect Request Forgery (SSRF) Vulnerability

This vulnerability requires {that a} contributor degree subscriber be logged in for the publicity to occur.

The non-profit Open Net Software Safety Undertaking (OWASP), a worldwide group devoted to software program safety, an SSRF vulnerability can lead to the publicity of inner companies that aren’t meant to be uncovered.

Based on OWASP:

“In a Server-Aspect Request Forgery (SSRF) assault, the attacker can abuse performance on the server to learn or replace inner sources.

The attacker can provide or modify a URL which the code operating on the server will learn or submit knowledge to, and by rigorously choosing the URLs, the attacker might be able to learn server configuration equivalent to AWS metadata, hook up with inner companies like http enabled databases or carry out put up requests in the direction of inner companies which aren’t supposed to be uncovered.”

The companies that aren’t presupposed to be uncovered are:

  • “Cloud server meta-data
  • Database HTTP interfaces
  • Inner REST interfaces
  • Information – The attacker might be able to learn information utilizing <file://> URIs”

HubSpot WordPress Plugin

The HubSpot WordPress plugin is utilized by over 200,000 publishers. It supplies CRM, dwell chat, analytics and e-mail advertising and marketing associated capabilities.

The vulnerability found by WPScan notes that it was mounted in model 8.8.15.

Nevertheless, the changelog that paperwork what was up to date within the software program exhibits that the HubSpot WordPress plugin acquired further updates to repair different vulnerabilities.

Here’s a checklist of the updates in line with the official changelog, so as starting with the oldest replace:

= 8.8.15 (2022-04-07) =
* Repair safety difficulty associated to proxy URL

= 8.9.14 (2022-04-12) =
* Repair safety difficulty associated to kind inputs

= 8.9.20 (2022-04-13) =
* Repair safety difficulty associated to sanitizing inputs

Whereas the safety agency WPScan and the Nationwide Vulnerability Database state that vulnerability was mounted in model 8.8.15, in line with the HubSpot plugin changelog, there have been additional safety fixes all the best way as much as model 8.9.20.

So it my be prudent to replace the HubSpot plugin to not less than model 8.9.20, though absolutely the newest model of the HubSpot WordPress plugin, as of this writing, is model 8.11.0.


Learn WPScan Vulnerability Report

HubSpot < 8.8.15 – Contributor+ Blind SSRF

Learn the Nationwide Vulnerability Database Report

CVE-2022-1239 Element

Evaluation the HubSpot WordPress Plugin Changelog

HubSpot WordPress Plugin Changelog


Previous articleTechnical Points Often Not a Set off for Core Replace Issues
Next articleWhy Key phrase Analysis Is Helpful for web optimization & How To Rank


Please enter your comment!
Please enter your name here