xmlrpc.php allows SSRF!

Shahariar Amin
3 min readOct 7, 2024

During my recent bug bounty hunting journey, I encountered a potential SSRF (Server-Side Request Forgery) vulnerability in the xmlrpc.php file of the Wurth.es website. In this post, I will walk you through the vulnerability discovery process, its impact, and possible remediation steps.

What is xmlrpc.php?

The xmlrpc.php file in WordPress is used to enable remote communication between the website and external services. While this file serves legitimate purposes, it can also be exploited for malicious activity if improperly secured.

One particularly dangerous method within xmlrpc.php is the pingback.ping method, which allows interaction with external servers. Attackers can exploit this function to perform SSRF attacks, where they trick the vulnerable server into making requests to unintended destinations, leading to severe consequences.

Steps to Reproduce the Vulnerability

  1. Send request to https://example.com/blog/xmlrpc.php

2. Switch the request method from GET to POST and add the following xml code in the request body.

3. This will return a xml code that represents some methods like system.multicall, pingback.ping, metaWeblog.deletePost etc. Here some methods need authentication as admin. But I tried to use pingback.ping

4. Modify the request with following code:

Change the SERVER url with any server of your own. Here, I use BurpSuite Collaborator for this purpose. The request looks like:

Proof of Vulnerability:

The response of the above request looks like:

Just notice the Collaborator for POC….

You will see a request came in Collaborator server , that is the pinging request generated in the previous request. That proves that our our example.com is communicating with random servers!

No more today! Don’t ask about bounty! I like being victim of scams….

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Shahariar Amin
Shahariar Amin

Written by Shahariar Amin

Penetration Tester (Web Application),Bug Hunter,CSE student of RUET,Bangladesh.

Responses (1)

Write a response

i found this vulnerability but i am not able to exploit. could you share a bug report ?

--