Description
Server-Side Request Forgery (SSRF) vulnerability in Getty Images Getty Images getty-images allows Server Side Request Forgery.This issue affects Getty Images: from n/a through <= 4.1.0.
Published: 2026-04-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery enabling arbitrary internal requests
Action: Patch Immediately
AI Analysis

Impact

A Server‑Side Request Forgery flaw exists in the Getty Images WordPress plugin for versions up to and including 4.1.0. The vulnerability allows an attacker to provoke the plugin to send HTTP requests to any target specified by the attacker. The plugin’s requests can be made to internal or external resources, potentially leaking sensitive data, accessing internal services, or serving as a foothold for further attacks. The weakness is classified as CWE‑918, a typical SSRF scenario where user input is not properly validated before being used as a request target.

Affected Systems

The affected component is the Getty Images WordPress plugin, provided by Getty Images, for all releases from the initial version through version 4.1.0. Users running any of those versions on a WordPress site are vulnerable.

Risk and Exploitability

The CVSS score, EPSS probability, and KEV status are not documented for this CVE. Nonetheless, the flaw can be exploited remotely by any party that can trigger a request to the WordPress instance hosting the plugin, such as via an exposed API endpoint or a crafted link. Exploitation conditions are relatively simple: the plugin must be active and the WordPress site must be reachable, after which an attacker can supply arbitrary URLs to force outbound traffic. The impact includes potential data leakage, internal network enumeration, and possible lateral movement, making the risk significant for any site that exposes the plugin to unauthenticated users.

Generated by OpenCVE AI on April 8, 2026 at 09:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Getty Images plugin to version 4.1.1 or newer.
  • If an upgrade is not immediately possible, disable or delete the Getty Images plugin from the WordPress installation.

Generated by OpenCVE AI on April 8, 2026 at 09:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Getty Images
Getty Images getty Images
Wordpress
Wordpress wordpress
Vendors & Products Getty Images
Getty Images getty Images
Wordpress
Wordpress wordpress

Wed, 08 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description Server-Side Request Forgery (SSRF) vulnerability in Getty Images Getty Images getty-images allows Server Side Request Forgery.This issue affects Getty Images: from n/a through <= 4.1.0.
Title WordPress Getty Images plugin <= 4.1.0 - Server Side Request Forgery (SSRF) vulnerability
Weaknesses CWE-918
References

Subscriptions

Getty Images Getty Images
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-08T08:30:28.416Z

Reserved: 2026-04-07T10:57:36.651Z

Link: CVE-2026-39630

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T09:16:33.473

Modified: 2026-04-08T21:26:35.910

Link: CVE-2026-39630

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:41:45Z

Weaknesses