PT-2026-32088 · Stiofansisland · Userswp – Front-End Login Form
Mariusz Maik
·
Published
2026-04-11
·
Updated
2026-04-11
·
CVE-2026-4979
CVSS v3.1
5.0
Medium
| AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N |
The UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WP plugin for WordPress is vulnerable to blind Server-Side Request Forgery in all versions up to, and including, 1.2.58. This is due to insufficient URL origin validation in the process image crop() method when processing avatar/banner image crop operations. The function accepts a user-controlled URL via the uwp crop POST parameter and only validates it using esc url() for sanitization and wp check filetype() for extension verification, without enforcing that the URL references a local uploads file. The URL is then passed to uwp resizeThumbnailImage() which uses it in PHP image processing functions (getimagesize(), imagecreatefrom*()) that support URL wrappers and perform outbound HTTP requests. This makes it possible for authenticated attackers with subscriber-level access and above to coerce the WordPress server into making arbitrary HTTP requests to attacker-controlled or internal network destinations, enabling internal network scanning and potential access to sensitive services.
Fix
SSRF
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Userswp – Front-End Login Form