Description
Featured Image from Content (featured-image-from-content) WordPress plugin versions prior to 1.7 contain an authenticated server-side request forgery vulnerability that allows Author-level users to fetch internal HTTP resources. Attackers can exploit insecure URL fetching and file write operations to retrieve sensitive internal data and store it in web-accessible upload directories.
Published: 2026-02-27
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery exposing internal resources
Action: Update
AI Analysis

Impact

The Featured Image from Content WordPress plugin, before version 1.7, contains an authenticated server‑side request forgery flaw. Authenticated users with author‑level permissions can trigger the plugin’s save_post routine to make the server fetch arbitrary URLs. Because the server performs the request using uncapped input, the attacker can extract internal HTTP resources and, through insecure file write operations, place the retrieved content into the site’s upload directory. This creates a risk of internal data disclosure and may be leveraged for further exploitation.

Affected Systems

Affected systems are WordPress sites that have the Featured Image from Content plugin installed in any release earlier than 1.7. The plugin is maintained by Dhrumil Kumbhani. The vulnerability is present in all prior versions and can be exercised by users who have author or higher privileges within the WordPress installation.

Risk and Exploitability

The CVSS base score of 5.3 reflects moderate severity, and the EPSS score below 1% indicates a low likelihood of exploitation at present. Because the flaw requires authenticated access with at least author privileges and involves outbound HTTP requests, attackers would need to compromise the user account or exploit another vulnerability that provides such privileges. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, further suggesting limited public exploitation.

Generated by OpenCVE AI on April 16, 2026 at 15:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Featured Image from Content plugin to version 1.7 or newer to eliminate the flaw.
  • Restrict or audit author‑level user permissions to the minimum necessary to reduce the attack surface.
  • If an upgrade is not immediately possible, block outbound HTTP requests from the plugin by disabling external requests or enabling WordPress settings such as WP_HTTP_BLOCK_EXTERNAL.

Generated by OpenCVE AI on April 16, 2026 at 15:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 02 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Dhrumil Kumbhani
Dhrumil Kumbhani featured Image From Content
Wordpress
Wordpress wordpress
Vendors & Products Dhrumil Kumbhani
Dhrumil Kumbhani featured Image From Content
Wordpress
Wordpress wordpress

Fri, 27 Feb 2026 22:30:00 +0000

Type Values Removed Values Added
Description Featured Image from Content (featured-image-from-content) WordPress plugin versions prior to 1.7 contain an authenticated server-side request forgery vulnerability that allows Author-level users to fetch internal HTTP resources. Attackers can exploit insecure URL fetching and file write operations to retrieve sensitive internal data and store it in web-accessible upload directories.
Title Featured Image from Content < 1.7 Authenticated SSRF via save_post
Weaknesses CWE-918
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L'}


Subscriptions

Dhrumil Kumbhani Featured Image From Content
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-02T15:17:44.408Z

Reserved: 2026-02-23T21:38:48.842Z

Link: CVE-2026-27759

cve-icon Vulnrichment

Updated: 2026-03-02T15:17:30.583Z

cve-icon NVD

Status : Deferred

Published: 2026-02-27T23:16:04.187

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-27759

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T15:15:39Z

Weaknesses