CVE-2026-2948
Server-Side Request Forgery in Gutenverse WordPress Plugin
Publication date: 2026-05-05
Last updated on: 2026-05-05
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gutenverse | ultimate_wordpress_fse_blocks_addons | to 3.5.3 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-918 | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The Gutenverse β Ultimate WordPress FSE Blocks Addons & Ecosystem plugin for WordPress has a Server-Side Request Forgery (SSRF) vulnerability in versions up to and including 3.5.3. This vulnerability exists in the import_images() function and allows authenticated attackers with contributor-level access or higher to make web requests to arbitrary locations from the web application.
Essentially, an attacker can exploit this flaw to make the server send requests to internal or external systems, potentially querying or modifying information from internal services.
How can this vulnerability impact me? :
This vulnerability can allow an attacker with contributor-level access or above to make unauthorized web requests from the server to arbitrary locations. This can lead to unauthorized querying and modification of information on internal services that are normally not accessible externally.
The impact includes potential data leakage, unauthorized access to internal systems, and manipulation of internal data, which can compromise the security and integrity of the affected WordPress site and its associated services.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows authenticated attackers with contributor-level access to perform Server-Side Request Forgery (SSRF), enabling them to make web requests to arbitrary locations and potentially query and modify information from internal services.
Such unauthorized access and potential modification of internal information could lead to breaches of confidentiality and integrity, which are critical aspects of compliance with standards like GDPR and HIPAA.
However, the provided information does not explicitly state the direct impact on compliance with these regulations.