Description
Server-Side Request Forgery (SSRF) vulnerability in Katsushi Kawamori Simple Blog Card simple-blog-card allows Server Side Request Forgery.This issue affects Simple Blog Card: from n/a through <= 2.37.
Published: 2026-03-13
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server Side Request Forgery
Action: Immediate Patch
AI Analysis

Impact

The Simple Blog Card plugin for WordPress, created by Katsushi Kawamori, contains a Server‑Side Request Forgery (SSRF) flaw that permits the server to issue HTTP requests to arbitrary URLs. According to the CVE description, this weakness arises from insufficient validation of user‑supplied URLs, allowing an attacker to initiate internal network requests or exfiltrate data, thereby jeopardizing confidentiality and potentially affecting integrity of exposed services.

Affected Systems

All released versions of the Katsushi Kawamori Simple Blog Card plugin, from the earliest available version up to and including version 2.37, are affected. No higher‑numbered version has been documented as providing a fix in the supplied data.

Risk and Exploitability

The CVSS score of 6.4 indicates moderate severity. The EPSS score is reported as less than 1%, suggesting a low likelihood of exploitation in the near term. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, indicating limited active exploitation. The provided description does not specify authentication requirements; it is inferred that the SSRF can be triggered via a publicly accessible plugin interface without special conditions, although this is not explicitly stated by the vendor.

Generated by OpenCVE AI on March 17, 2026 at 18:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Simple Blog Card plugin to the latest available version (if newer than 2.37) as soon as a patch is released.
  • If an update is not immediately available, temporarily disable or delete the plugin to eliminate the SSRF risk.
  • Regularly check the vendor’s website or security advisory feeds for any new patches or mitigation information.

Generated by OpenCVE AI on March 17, 2026 at 18:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Katsushi Kawamori
Katsushi Kawamori simple Blog Card
Wordpress
Wordpress wordpress
Vendors & Products Katsushi Kawamori
Katsushi Kawamori simple Blog Card
Wordpress
Wordpress wordpress

Fri, 13 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Description Server-Side Request Forgery (SSRF) vulnerability in Katsushi Kawamori Simple Blog Card simple-blog-card allows Server Side Request Forgery.This issue affects Simple Blog Card: from n/a through <= 2.37.
Title WordPress Simple Blog Card plugin <= 2.37 - Server Side Request Forgery (SSRF) vulnerability
Weaknesses CWE-918
References

Subscriptions

Katsushi Kawamori Simple Blog Card
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:58.284Z

Reserved: 2026-03-12T11:10:47.069Z

Link: CVE-2026-32357

cve-icon Vulnrichment

Updated: 2026-03-16T13:54:11.354Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-13T19:54:49.337

Modified: 2026-03-16T14:53:46.157

Link: CVE-2026-32357

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T09:58:59Z

Weaknesses