PT-2025-36441 · WordPress · Ditty Wordpress Plugin
Dmitry Ignatyev
·
Published
2025-09-08
·
Updated
2025-09-08
·
CVE-2025-8085
CVSS v3.1
8.6
8.6
High
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N |
**Name of the Vulnerable Software and Affected Versions:**
Ditty WordPress plugin versions prior to 3.1.58
**Description:**
The Ditty WordPress plugin is susceptible to an unauthenticated Server-Side Request Forgery (SSRF) condition. This flaw resides in the `wp-json/dittyeditor/v1/displayItems` API endpoint, which does not enforce proper authorization. This allows unauthenticated attackers to make requests to arbitrary URLs, potentially enabling internal network reconnaissance or access to protected resources.
**Recommendations:**
Update Ditty WordPress plugin to version 3.1.58 or later.
Exploit
Fix
Related Identifiers
CVE-2025-8085
Affected Products
Ditty Wordpress Plugin
References · 15
- 🔥 https://wpscan.com/vulnerability/f42c37bb-1ae0-49ab-bd81-7864dff0fcff · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-8085 · Security Note
- https://twitter.com/transilienceai/status/1965000708521935202 · Twitter Post
- https://t.me/brutsecurity/2215 · Telegram Post
- https://twitter.com/VulmonFeeds/status/1964939167072178385 · Twitter Post
- https://twitter.com/xfeylesof/status/1965012862960910665 · Twitter Post
- https://twitter.com/transilienceai/status/1964996337222459656 · Twitter Post
- https://twitter.com/transilienceai/status/1965000697155317987 · Twitter Post
- https://t.me/cveNotify/134594 · Telegram Post
- https://t.me/netlas/473 · Telegram Post
- https://twitter.com/CVEnew/status/1964937698373976071 · Twitter Post
- https://twitter.com/tpx_Security/status/1965092338763477435 · Twitter Post
- https://twitter.com/Netlas_io/status/1964995963451494596 · Twitter Post
- https://twitter.com/NullSecurityX/status/1965010210868908511 · Twitter Post
- https://twitter.com/VolerionSec/status/1964936140802183234 · Twitter Post