CVE-2026-0688
MEDIUM
6,4
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: changed
Confidentiality: low
Integrity: low
Availability: none
Description
AI Translation Available
The Webmention plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.6.2 via the 'Tools::read' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
918
Server-Side Request Forgery (SSRF)
IncompleteCommon Consequences
Security Scopes Affected:
Confidentiality
Integrity
Access Control
Potential Impacts:
Read Application Data
Execute Unauthorized Code Or Commands
Bypass Protection Mechanism
Applicable Platforms
Technologies:
AI/ML, Web Based, Web Server
https://github.com/pfefferle/wordpress-webmention/blob/057223cee18a9e93b017d0f2…
https://plugins.trac.wordpress.org/browser/webmention/tags/5.6.2/includes/class…
https://plugins.trac.wordpress.org/changeset/3494831/webmention
https://www.wordfence.com/threat-intel/vulnerabilities/id/02c9beba-dfa5-4a30-83…