CVE-2026-0686 in Webmention Plugin
Сводка (Английский)
The Webmention plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.6.2 in the 'MF2::parse_authorpage' function via the 'Receiver::post' function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Ответственный
Wordfence
Резервировать
07.01.2026
Раскрытие
02.04.2026
Статус
Подтверждённый
Записи
VulDB provides additional information and datapoints for this CVE:
| ИД | Уязвимость | CWE | Экс | Кон | CVE |
|---|---|---|---|---|---|
| 354832 | pfefferle Webmention Plugin parse_authorpage эскалация привилегий | 918 | Не определено | Не определено | CVE-2026-0686 |