Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9rxx-66q3-qpfv

Опубликовано: 24 янв. 2026
Источник: github
Github: Не прошло ревью
CVSS3: 7.2

Описание

The Frontis Blocks plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.1.6. This is due to insufficient restriction on the 'url' parameter in the 'template_proxy' function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application via the '/template-proxy/' and '/proxy-image/' endpoint.

The Frontis Blocks plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.1.6. This is due to insufficient restriction on the 'url' parameter in the 'template_proxy' function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application via the '/template-proxy/' and '/proxy-image/' endpoint.

EPSS

Процентиль: 21%
0.00068
Низкий

7.2 High

CVSS3

Дефекты

CWE-918

Связанные уязвимости

CVSS3: 7.2
nvd
15 дней назад

The Frontis Blocks plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.1.6. This is due to insufficient restriction on the 'url' parameter in the 'template_proxy' function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application via the '/template-proxy/' and '/proxy-image/' endpoint.

EPSS

Процентиль: 21%
0.00068
Низкий

7.2 High

CVSS3

Дефекты

CWE-918