• Resolved angiepunkt

    (@angiepunkt)


    Hello!
    I get this warning from my hoster. Is Rank Math save with the latest Update (Version 1.0.96)?
    Thank you, Angie.

Viewing 3 replies - 1 through 3 (of 3 total)
  • Plugin Support Rank Math Support

    (@rankmathteam)

    Hello @angiepunkt,

    Thank you for contacting the support.

    Our plugin does not open up any vulnerable endpoints. It only exposes endpoints that were previously public (before the user blocked them via .htaccess), so making them public again probably does not pose any real danger.

    We consider this to be a minor security issue (CVSS around 3.1), given the pre-requisites of:
    A) The “Headless CMS Support” option must be enabled on the site, which is OFF by default for all users.
    B) The other endpoints must be blocked via .htaccess, using very specific rules, also considering that the endpoint has sensitive data.
    C) Blocking the endpoints via WP’s own system of filters and action hooks, which is the more standard way of doing it on a WP site, would prevent this issue. A different set of rules in the .htaccess file can also prevent this issue.
    D) Attacker would have to know about the protected endpoint.

    Having said that, we fixed the issue the next day with a hotfix, so we recommend updating to the latest version.

    Hope that helps, and please do not hesitate to let us know if you need our assistance with anything else.

    Thread Starter angiepunkt

    (@angiepunkt)

    Thank you!!

    Plugin Support Rank Math Support

    (@rankmathteam)

    Hello @angiepunkt,

    We are glad that we were able to address your concerns.

    If it isn’t too much to ask for – would you mind leaving us a review here?
    https://www.ads-software.com/support/plugin/seo-by-rank-math/reviews/#new-post

    It only takes a couple of minutes but helps us tremendously.

    It would mean so much to us and would go a really long way.

    Thank you.??

Viewing 3 replies - 1 through 3 (of 3 total)
  • The topic ‘Server-Side Request Forgery (SSRF) vulnerability’ is closed to new replies.