CVE-2026-0688
SSRF Vulnerability in WordPress Webmention Plugin Allows Internal Access
Publication date: 2026-04-02
Last updated on: 2026-04-02
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordfence | webmention | to 5.6.2 (inc) |
| wordfence | webmention | 5.7.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-918 | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The Webmention plugin for WordPress has a Server-Side Request Forgery (SSRF) vulnerability in all versions up to and including 5.6.2. This vulnerability exists in the 'Tools::read' function, which is part of a REST API endpoint that fetches content from a specified source URL. Authenticated users with Subscriber-level access or higher can exploit this flaw to make the web application send HTTP requests to arbitrary locations, including internal services that are not normally accessible externally.
The vulnerability arises because the plugin uses an unsafe HTTP request method (Request::get) without sufficient restrictions, allowing attackers to control the URL being requested. This can lead to unauthorized querying and modification of internal service information.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing an attacker with minimal privileges (Subscriber-level or above) to make your WordPress server perform HTTP requests to arbitrary internal or external locations. This can lead to several security risks:
- Unauthorized access to internal services that are not exposed externally.
- Potential exposure or modification of sensitive internal data.
- Use of your server as a proxy to attack other systems or bypass network restrictions.
- Increased risk of further exploitation due to information disclosure or internal service manipulation.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
The vulnerability involves the Webmention plugin's REST API endpoint at `webmention/1.0/parse` which allows authenticated users with Subscriber-level access or higher to make server-side HTTP requests to arbitrary URLs via the `Tools::read` function.
To detect exploitation attempts or the presence of this vulnerability on your system, you can monitor HTTP requests to the REST API endpoint `/wp-json/webmention/1.0/parse`.
Suggested commands to detect suspicious activity include:
- Using web server logs (e.g., Apache or Nginx) to search for requests to the vulnerable REST API endpoint:
- grep "/wp-json/webmention/1.0/parse" /var/log/apache2/access.log
- grep "/wp-json/webmention/1.0/parse" /var/log/nginx/access.log
- Look for HTTP GET requests with parameters `source` and `target` which may indicate attempts to exploit the SSRF.
- Use WordPress CLI or REST API tools to test the endpoint if you have authenticated access, for example using curl with authentication tokens to invoke the endpoint and observe responses.
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation is to update the Webmention plugin to version 5.7.0 or later, where the SSRF vulnerability has been fixed by replacing unsafe HTTP requests with the safer `wp_safe_remote_get` function.
Additional immediate steps include:
- Restrict access to the WordPress REST API endpoint `/wp-json/webmention/1.0/parse` to trusted users only, ensuring that only authenticated users with appropriate permissions can access it.
- Review and limit user roles and capabilities to prevent Subscriber-level or higher users from abusing this functionality if an update is not immediately possible.
- Monitor and block suspicious requests targeting the vulnerable endpoint at the network or application firewall level.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided context and resources do not contain specific information about how the CVE-2026-0688 vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.