Description
Server-Side Request Forgery (SSRF) vulnerability in ILLID Share This Image share-this-image allows Server Side Request Forgery.This issue affects Share This Image: from n/a through <= 2.14.
Published: 2026-04-29
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the Share This Image WordPress plugin. The plugin processes image URLs from the WordPress Media Library. An attacker can supply a crafted URL that is then requested by the plugin server, allowing the server to reach arbitrary internal or external resources. This can be used to enumerate internal services, exfiltrate data, or potentially exploit other vulnerabilities if the fetched content is subsequently processed. The weakness is identified as CWE‑918 – Server‑Side Request Forgery. The overall impact is that an attacker can force the server to make HTTP/S requests to chosen targets, which can lead to data disclosure or escalation of privileges depending on the target system.

Affected Systems

The plugin version range affected is all releases up to and including 2.14. The plugin is distributed by ILLID under the name Share This Image. Any WordPress installation that has this plugin installed with a version ≤ 2.14 is vulnerable. No specific operating system or WordPress core version is required beyond the presence of the plugin.

Risk and Exploitability

The CVSS score for this vulnerability is 5.4, indicating a moderate severity. EPSS is not available, so the historical likelihood of exploitation is unknown. The absence of a KEV listing means that there is no public evidence of active exploitation in the wild, but the lack of data does not preclude the possibility. The attack vector is likely via the web interface or an exposed plugin endpoint; the goal is to supply a malicious URL that the plugin will resolve. Successful exploitation would allow an attacker to cause the WordPress server to act as a proxy, potentially exposing internal resources or enabling subsequent attacks such as local privilege escalation or data exfiltration. The risk is increased if the WordPress configuration permits outgoing requests to internal networks or untrusted networks.

Generated by OpenCVE AI on April 29, 2026 at 12:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Share This Image plugin to the latest released version (≥ 3.0) that removes the SSRF entry point.
  • If an upgrade is not immediately possible, restrict outbound HTTP/S connections from the WordPress installation to known trusted destinations using network ACLs or a web application firewall rule.
  • Disable the image-sharing feature or remove the plugin entirely until a patched version is available.
  • Monitor logs for abnormal outbound requests originating from the WordPress server and investigate any unexpected destinations.

Generated by OpenCVE AI on April 29, 2026 at 12:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 29 Apr 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Illid
Illid share This Image
Wordpress
Wordpress wordpress
Vendors & Products Illid
Illid share This Image
Wordpress
Wordpress wordpress

Wed, 29 Apr 2026 11:30:00 +0000

Type Values Removed Values Added
Description Server-Side Request Forgery (SSRF) vulnerability in ILLID Share This Image share-this-image allows Server Side Request Forgery.This issue affects Share This Image: from n/a through <= 2.14.
Title WordPress Share This Image plugin <= 2.14 - Server Side Request Forgery (SSRF) vulnerability
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Illid Share This Image
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-29T15:09:47.725Z

Reserved: 2026-04-29T09:04:31.204Z

Link: CVE-2026-42641

cve-icon Vulnrichment

Updated: 2026-04-29T14:55:34.496Z

cve-icon NVD

Status : Deferred

Published: 2026-04-29T12:16:19.260

Modified: 2026-04-29T21:15:41.667

Link: CVE-2026-42641

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T13:15:11Z

Weaknesses