Description
Server-Side Request Forgery (SSRF) vulnerability in Andy Fragen Embed PDF Viewer embed-pdf-viewer allows Server Side Request Forgery.This issue affects Embed PDF Viewer: from n/a through <= 2.4.7.
Published: 2026-03-13
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Patch
AI Analysis

Impact

This vulnerability is a Server‑Side Request Forgery (SSRF) that allows an attacker to make the Embed PDF Viewer plugin fetch arbitrary resources from the host system. The flaw stems from the plugin accepting a user‑supplied PDF URL without adequate validation, enabling requests to internal or external services. Successful exploitation could lead to data exfiltration, bypassing network perimeter defenses, or using the affected server as a proxy for further attacks. The weakness is identified as CWE‑918.

Affected Systems

The affected product is the WordPress Embed PDF Viewer plugin developed by Andy Fragen. All installations running any version up to and including 2.4.7 are vulnerable. No additional edition or configuration requirements are listed.

Risk and Exploitability

The CVSS base score of 4.9 indicates moderate severity, and the EPSS score of less than 1% denotes a low probability of exploitation in the wild. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. The likely attack vector is inferred to involve submitting a crafted PDF URL through the plugin’s interface or sending a specially crafted request to the plugin endpoint, typically requiring a user session with upload or plugin management permissions. While the exploit does not provide immediate remote code execution, it can expose internal network resources and serve as a stepping stone for more dangerous attacks.

Generated by OpenCVE AI on March 19, 2026 at 15:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Embed PDF Viewer plugin to a version newer than 2.4.7.
  • If updating immediately is not possible, disable the plugin until a fix is available.
  • Ensure the WordPress site restricts access to the plugin interface to trusted administrators only and monitor for suspicious activity.

Generated by OpenCVE AI on March 19, 2026 at 15:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Andy Fragen
Andy Fragen embed Pdf Viewer
Wordpress
Wordpress wordpress
Vendors & Products Andy Fragen
Andy Fragen embed Pdf Viewer
Wordpress
Wordpress wordpress

Fri, 13 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Description Server-Side Request Forgery (SSRF) vulnerability in Andy Fragen Embed PDF Viewer embed-pdf-viewer allows Server Side Request Forgery.This issue affects Embed PDF Viewer: from n/a through <= 2.4.7.
Title WordPress Embed PDF Viewer plugin <= 2.4.7 - Server Side Request Forgery (SSRF) vulnerability
Weaknesses CWE-918
References

Subscriptions

Andy Fragen Embed Pdf Viewer
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:56.803Z

Reserved: 2026-03-12T11:10:47.068Z

Link: CVE-2026-32349

cve-icon Vulnrichment

Updated: 2026-03-13T20:03:06.801Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-13T19:54:46.793

Modified: 2026-03-16T14:53:46.157

Link: CVE-2026-32349

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T09:59:07Z

Weaknesses