CVE-2025-8085
Published: 08 September 2025
Summary
CVE-2025-8085 is a high-severity SSRF (CWE-918) vulnerability in Metaphorcreations Ditty. Its CVSS base score is 8.6 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 6.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces authentication and authorization on the displayItems endpoint to prevent unauthenticated users from triggering SSRF requests to arbitrary URLs.
Validates URL inputs to the displayItems endpoint to block server-side fetches to unauthorized internal or external resources.
Enforces information flow control policies to restrict server-initiated requests from SSRF exploitation to unauthorized destinations.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SSRF in public-facing WordPress plugin endpoint directly enables remote exploitation of the application (T1190) and specifically facilitates access to cloud instance metadata APIs (T1522) as described.
NVD Description
The Ditty WordPress plugin before 3.1.58 lacks authorization and authentication for requests to its displayItems endpoint, allowing unauthenticated visitors to make requests to arbitrary URLs.
Deeper analysisAI
CVE-2025-8085 is a server-side request forgery (SSRF) vulnerability, classified under CWE-918, affecting the Ditty WordPress plugin in versions prior to 3.1.58. The flaw arises from insufficient authorization and authentication controls on the displayItems endpoint, which permits unauthenticated visitors to submit requests that cause the server to fetch content from arbitrary URLs. Published on 2025-09-08, it carries a CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N), indicating high severity due to network accessibility, low attack complexity, and significant confidentiality impact across a changed scope.
Any unauthenticated internet user can exploit this vulnerability by sending crafted requests to the exposed displayItems endpoint on a vulnerable WordPress site. No privileges, user interaction, or special conditions are required, enabling remote attackers to manipulate the server into issuing HTTP requests to attacker-controlled or internal URLs. This can result in the disclosure of sensitive information accessible to the server, such as metadata from internal services, cloud metadata endpoints, or other resources not directly reachable from the internet.
The WPScan advisory at https://wpscan.com/vulnerability/f42c37bb-1ae0-49ab-bd81-7864dff0fcff/ provides further details, with mitigation achieved by upgrading the Ditty plugin to version 3.1.58 or later, which introduces the necessary authentication and authorization checks.
Details
- CWE(s)