Description
The Featured Image from URL (FIFU) plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.3.1. This is due to insufficient validation of user-supplied URLs before passing them to the getimagesize() function in the Elementor widget integration. This makes it possible for authenticated attackers, with Contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services via the fifu_input_url parameter in the FIFU Elementor widget granted they have permissions to use Elementor.
Published: 2026-01-10
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Apply Patch
AI Analysis

Impact

The Featured Image from URL (FIFU) plugin for WordPress is vulnerable to Server‑Side Request Forgery in all versions up to and including 5.3.1. The flaw stems from inadequate validation of user‑supplied URLs before they are passed to PHP's getimagesize() function within the Elementor widget integration. An attacker who can authenticate with at least Contributor‑level access and who has permission to use Elementor can supply a crafted value for the fifu_input_url parameter, causing the web application to initiate arbitrary HTTP requests from the server. This permits the attacker to probe internal network services, read sensitive data from protected resources, and potentially modify or compromise internal systems depending on the target endpoints. The primary impact is confidentiality and integrity violation of internal resources through a server‑side request, a classic Server‑Side Request Forgery (SSRF) vulnerability.

Affected Systems

WordPress sites that have the Featured Image from URL (FIFU) plugin installed with version 5.3.1 or earlier. The vulnerability is present in the Elementor widget integration of the plugin. Administrators should verify the installed plugin version on all sites.

Risk and Exploitability

The CVSS score of 4.3 indicates a low overall severity, and the EPSS score of less than 1 % suggests that the probability of exploitation in the wild is very low. The flaw can be exploited only by users who can authenticate and hold Contributor or higher privileges within WordPress, which limits the attacker’s initial access. Consequently the threat is primarily internal; an attacker with such permissions could use the plugin to reach internal services, but a remote unauthenticated attacker cannot exploit the issue directly. The vulnerability is not listed in CISA’s KEV catalog, and no public exploit evidence is known at this time. Nonetheless, because it enables SSRF, institutions that expose internal resources should consider it a moderate risk if an attacker gains Contributor access.

Generated by OpenCVE AI on April 21, 2026 at 00:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Featured Image from URL (FIFU) plugin to the latest version that removes the SSRF flaw.
  • Restrict Contributor and higher roles from invoking the FIFU Elementor widget or disable the fifu_input_url parameter for non‑trusted users.
  • Implement network controls to block outbound requests from the WordPress application to internal IP ranges that should not be reachable from the web server.

Generated by OpenCVE AI on April 21, 2026 at 00:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 12 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 12 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Fifu
Fifu featured Image From Url
Wordpress
Wordpress wordpress
Vendors & Products Fifu
Fifu featured Image From Url
Wordpress
Wordpress wordpress

Sat, 10 Jan 2026 14:00:00 +0000

Type Values Removed Values Added
Description The Featured Image from URL (FIFU) plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.3.1. This is due to insufficient validation of user-supplied URLs before passing them to the getimagesize() function in the Elementor widget integration. This makes it possible for authenticated attackers, with Contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services via the fifu_input_url parameter in the FIFU Elementor widget granted they have permissions to use Elementor.
Title Featured Image from URL (FIFU) <= 5.3.1 - Authenticated (Contributor+) Server-Side Request Forgery via 'fifu_input_url'
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Fifu Featured Image From Url
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:17:36.479Z

Reserved: 2025-11-19T01:08:40.615Z

Link: CVE-2025-13393

cve-icon Vulnrichment

Updated: 2026-01-12T18:28:11.612Z

cve-icon NVD

Status : Deferred

Published: 2026-01-10T14:15:49.907

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13393

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T00:30:22Z

Weaknesses