VYPR
Low severity3.8NVD Advisory· Published Oct 14, 2025· Updated Apr 15, 2026

CVE-2025-8594

CVE-2025-8594

Description

The Pz-LinkCard WordPress plugin before 2.5.7 does not validate a parameter before making a request to it, which could allow users with a role as low as Contributor to perform SSRF attack.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Pz-LinkCard plugin before 2.5.7 allows Contributor+ users to trigger SSRF by not validating a request parameter.

Vulnerability

The Pz-LinkCard WordPress plugin versions before 2.5.7 fail to validate a parameter before making a server-side request based on it. This oversight allows an attacker to control the destination of the request, leading to a Server-Side Request Forgery (SSRF) vulnerability [1].

Exploitation

An attacker with a role as low as Contributor can exploit this flaw. No additional authentication beyond the existing WordPress user account is required, and the attack can be performed through normal plugin functionality that accepts external URLs or similar input [1].

Impact

Successful exploitation allows the attacker to make requests from the server to internal or external resources, potentially accessing sensitive data, internal services, or performing port scanning. The CVSS score of 3.8 indicates a low severity, but SSRF can be a stepping stone for further attacks [1].

Mitigation

The vulnerability is fixed in version 2.5.7. Users are advised to update the plugin immediately. No known workarounds are available [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.