CVE-2026-2948
Deferred Deferred - Pending Action
Server-Side Request Forgery in Gutenverse WordPress Plugin

Publication date: 2026-05-05

Last updated on: 2026-05-05

Assigner: Wordfence

Description
The Gutenverse – Ultimate WordPress FSE Blocks Addons & Ecosystem plugin for WordPress is vulnerable to Server-Side Request Forgery in versions up to, and including, 3.5.3 via the import_images() function. This makes it possible for authenticated attackers, with contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-05
Last Modified
2026-05-05
Generated
2026-05-07
AI Q&A
2026-05-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gutenverse ultimate_wordpress_fse_blocks_addons to 3.5.3 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The Gutenverse – Ultimate WordPress FSE Blocks Addons & Ecosystem plugin for WordPress has a Server-Side Request Forgery (SSRF) vulnerability in versions up to and including 3.5.3. This vulnerability exists in the import_images() function and allows authenticated attackers with contributor-level access or higher to make web requests to arbitrary locations from the web application.

Essentially, an attacker can exploit this flaw to make the server send requests to internal or external systems, potentially querying or modifying information from internal services.


How can this vulnerability impact me? :

This vulnerability can allow an attacker with contributor-level access or above to make unauthorized web requests from the server to arbitrary locations. This can lead to unauthorized querying and modification of information on internal services that are normally not accessible externally.

The impact includes potential data leakage, unauthorized access to internal systems, and manipulation of internal data, which can compromise the security and integrity of the affected WordPress site and its associated services.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows authenticated attackers with contributor-level access to perform Server-Side Request Forgery (SSRF), enabling them to make web requests to arbitrary locations and potentially query and modify information from internal services.

Such unauthorized access and potential modification of internal information could lead to breaches of confidentiality and integrity, which are critical aspects of compliance with standards like GDPR and HIPAA.

However, the provided information does not explicitly state the direct impact on compliance with these regulations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart