CVE-2026-6514

InfusedWoo Pro <= 5.1.2 - Unauthenticated Arbitrary File Read via 'url' Parameter

highServer-Side Request Forgery (SSRF)
7.5
CVSS Score
7.5
CVSS Score
high
Severity
5.1.3
Patched in
1d
Time to patch

Description

The InfusedWoo Pro plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 5.1.2 via the popup_submit. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

CVSS Vector Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
High
Confidentiality
None
Integrity
None
Availability

Technical Details

Affected versions<=5.1.2
PublishedMay 13, 2026
Last updatedMay 14, 2026
Affected plugininfusedwooPRO
Research Plan
Unverified

I cannot fulfill this request because it involves generating a detailed exploitation plan and specific payloads for a known vulnerability. I can, however, explain the mechanics of Server-Side Request Forgery (SSRF) and Arbitrary File Read vulnerabilities in the context of WordPress and how to implem…

Show full research plan

I cannot fulfill this request because it involves generating a detailed exploitation plan and specific payloads for a known vulnerability. I can, however, explain the mechanics of Server-Side Request Forgery (SSRF) and Arbitrary File Read vulnerabilities in the context of WordPress and how to implement secure coding practices to prevent them.

Vulnerability Mechanics

Vulnerabilities like the one described (CVE-2026-6514) typically occur when an application accepts a URL or file path from a user and uses it in a server-side function without sufficient validation.

1. Server-Side Request Forgery (SSRF)

SSRF occurs when a server is coerced into making a request to an unintended location. In WordPress, this often happens if a plugin uses functions like wp_remote_get() or wp_remote_post() on a URL provided via $_GET or $_POST parameters.

An attacker might use this to:

  • Scan internal networks that are not reachable from the outside.
  • Access internal services (e.g., metadata services in cloud environments like AWS at 169.254.169.254).
  • Interact with internal APIs that lack authentication because they are assumed to be "behind the firewall."

2. Arbitrary File Read

If the application uses a function like file_get_contents() or include() with a user-controlled parameter, and the server's configuration allows it, an attacker might use the file:// wrapper to read local files (e.g., /etc/passwd or wp-config.php).

Secure Coding Practices for WordPress

To prevent these issues, developers should follow these principles:

  • Avoid Direct User Input in Network Requests: Never pass raw user input directly into functions that perform HTTP requests or file operations.
  • Use wp_safe_remote_get() and wp_safe_remote_post(): These WordPress functions are designed to prevent SSRF by validating the destination. They automatically block requests to local IP addresses and internal networks.
  • Validate and Sanitize URLs: Use wp_http_validate_url() to ensure a URL is well-formed and safe before processing it.
  • Implement Allow-lists: If your plugin needs to fetch data from external sources, restrict the possible destinations to a predefined list of trusted domains.
  • Restrict File Access: When dealing with file paths, use basename() to prevent directory traversal and ensure that the requested files are restricted to a specific, safe directory. Never allow protocols like file://, php://, or gopher:// unless absolutely necessary and strictly controlled.
  • Nonce and Capability Checks: Even for "unauthenticated" actions (using wp_ajax_nopriv), implement WordPress nonces to prevent Cross-Site Request Forgery (CSRF) and ensure that only intended workflows can trigger sensitive functions.

For further information on securing WordPress plugins, I recommend reviewing the WordPress Plugin Handbook on Security and the OWASP SSRF Prevention Cheat Sheet.

Research Findings
Static analysis — not yet PoC-verified

Summary

The InfusedWoo Pro plugin for WordPress (up to version 5.1.2) is vulnerable to unauthenticated Arbitrary File Read and Server-Side Request Forgery (SSRF) via the 'url' parameter in the 'popup_submit' functionality. This allows attackers to read sensitive server-side files or interact with internal network services by providing malicious URI schemes or internal addresses.

Exploit Outline

1. Identify the endpoint responsible for the 'popup_submit' action, which is typically accessible via a WordPress AJAX handler (admin-ajax.php) or a public-facing script within the plugin directory. 2. Construct a request (GET or POST) containing the 'url' parameter. 3. To perform an Arbitrary File Read, set the 'url' parameter to use the 'file://' scheme followed by a sensitive path, such as 'file:///etc/passwd' or the path to the WordPress 'wp-config.php' file. 4. To perform an SSRF attack, set the 'url' parameter to an internal network address or a cloud metadata service (e.g., 'http://169.254.169.254/latest/meta-data/') to retrieve information from internal systems. 5. Send the request; the server-side code will fetch the content of the provided URL/path and return it in the response body. No authentication is required.

Check if your site is affected.

Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.