CVE-2026-4979
Received Received - Intake
Blind SSRF in UsersWP Plugin Allows Internal Network Access

Publication date: 2026-04-11

Last updated on: 2026-04-11

Assigner: Wordfence

Description
The UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WP plugin for WordPress is vulnerable to blind Server-Side Request Forgery in all versions up to, and including, 1.2.58. This is due to insufficient URL origin validation in the process_image_crop() method when processing avatar/banner image crop operations. The function accepts a user-controlled URL via the uwp_crop POST parameter and only validates it using esc_url() for sanitization and wp_check_filetype() for extension verification, without enforcing that the URL references a local uploads file. The URL is then passed to uwp_resizeThumbnailImage() which uses it in PHP image processing functions (getimagesize(), imagecreatefrom*()) that support URL wrappers and perform outbound HTTP requests. This makes it possible for authenticated attackers with subscriber-level access and above to coerce the WordPress server into making arbitrary HTTP requests to attacker-controlled or internal network destinations, enabling internal network scanning and potential access to sensitive services.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-11
Last Modified
2026-04-11
Generated
2026-05-07
AI Q&A
2026-04-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ayecode userswp to 1.2.58 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in the UsersWP WordPress plugin is a blind Server-Side Request Forgery (SSRF) issue affecting all versions up to 1.2.58. It arises because the plugin's image cropping function (process_image_crop) does not properly validate the origin of URLs provided by users when cropping avatar or banner images.

Specifically, the function accepts a user-controlled URL via the uwp_crop POST parameter and only performs basic sanitization and file type checks without ensuring the URL points to a local file. This URL is then used in PHP image processing functions that can make outbound HTTP requests.

As a result, an authenticated attacker with subscriber-level access or higher can trick the WordPress server into making arbitrary HTTP requests to attacker-controlled or internal network addresses, potentially enabling internal network scanning and access to sensitive services.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows authenticated attackers to coerce the WordPress server into making arbitrary HTTP requests to attacker-controlled or internal network destinations, potentially enabling internal network scanning and access to sensitive services.

Such unauthorized access or scanning could lead to exposure or compromise of sensitive data, which may impact compliance with data protection regulations like GDPR or HIPAA that require safeguarding sensitive information and preventing unauthorized access.

However, the provided information does not explicitly describe direct effects on compliance with these standards.


How can this vulnerability impact me? :

This vulnerability allows an attacker with at least subscriber-level access to coerce the WordPress server into making arbitrary HTTP requests to external or internal network destinations.

  • Internal network scanning: The attacker can probe internal services that are not normally accessible from outside.
  • Potential access to sensitive internal services by leveraging the server as a proxy.
  • Indirectly, this could lead to further exploitation if sensitive services are discovered or accessed.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves the UsersWP WordPress plugin processing user-controlled URLs in image cropping operations, which can lead to blind Server-Side Request Forgery (SSRF). Detection involves monitoring for unusual outbound HTTP requests initiated by the WordPress server, especially those triggered by authenticated users with subscriber-level access or above.

You can detect exploitation attempts by checking web server logs for POST requests to the image cropping endpoint containing the parameter 'uwp_crop' with suspicious external URLs.

Additionally, network monitoring tools can be used to identify unexpected outbound HTTP requests from the WordPress server to external or internal IP addresses.

  • Use grep or similar commands on your web server logs to find POST requests with the 'uwp_crop' parameter, for example: grep -i 'uwp_crop' /path/to/access.log
  • Monitor outbound HTTP requests from the server using tools like tcpdump or Wireshark, for example: sudo tcpdump -i eth0 'tcp port 80 or tcp port 443'
  • Check for unusual PHP processes or scripts making external HTTP requests by reviewing PHP error logs or using process monitoring commands.

What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability immediately, update the UsersWP plugin to a version that includes the security fix addressing CVE-2026-4979.

The fix enforces strict validation of image URLs to ensure they belong to the local WordPress content directory and validates file types, preventing external or malicious URLs from being processed.

If an immediate update is not possible, restrict access to the image cropping functionality to trusted users only and monitor for suspicious activity as a temporary measure.

Additionally, consider implementing network-level controls to block outbound HTTP requests from the WordPress server to untrusted external or internal IP addresses.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart