Miggo Logo

CVE-2023-23684:
WPGraphQL Plugin vulnerable to Server Side Request Forgery (SSRF)

6.5

CVSS Score

Basic Information

EPSS Score
-
Published
6/30/2023
Updated
11/17/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
wp-graphql/wp-graphqlcomposer<= 1.14.51.14.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insufficient validation in the createMediaItem mutation handler. The provided workaround adds critical validation checks (wp_http_validate_url, protocol whitelisting) that were missing in versions ≤1.14.5. The pull request #2840 specifically modifies MediaItemCreate.php, indicating this is where the vulnerable code resided. The resolve method would have processed the 'filePath' argument without these security checks, allowing arbitrary URL schemes and SSRF vectors.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t Us*rs wit* **p**iliti*s to uplo** m**i* (**itors *n* **ov*) *r* su***pti*l* to SSR* (S*rv*r-Si** R*qu*st *or**ry) w**n *x**utin* t** `*r**t*M**i*It*m` Mut*tion. *ut**nti**t** us*rs m*kin* *r*p*QL r*qu*sts t**t *x**ut* t** `*r**t*M**i*It*

Reasoning

T** vuln*r**ility st*ms *rom insu**i*i*nt v*li**tion in t** *r**t*M**i*It*m mut*tion **n*l*r. T** provi*** work*roun* ***s *riti**l v*li**tion ****ks (wp_*ttp_v*li**t*_url, proto*ol w*it*listin*) t**t w*r* missin* in v*rsions ≤*.**.*. T** pull r*qu*s