top of page
perceptive_background_267k.jpg

The Webmention plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.6.2 in the 'MF2::parse_authorpage' func…

Published:

1 April 2026 at 22:00:00

Alert date:

2 April 2026 at 09:01:29

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies

The WordPress Webmention plugin versions up to 5.6.2 contains a Server-Side Request Forgery vulnerability in the MF2::parse_authorpage function via the Receiver::post function. This vulnerability allows unauthenticated attackers to make arbitrary web requests from the application server, potentially enabling them to query and modify internal services. The flaw affects all versions up to and including 5.6.2 and can be exploited without authentication, making it a significant security risk for WordPress sites using this plugin.

Technical details

Mitigation steps:

Affected products:

WordPress Webmention Plugin

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page