Description
The UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WP plugin for WordPress is vulnerable to blind Server-Side Request Forgery in all versions up to, and including, 1.2.58. This is due to insufficient URL origin validation in the process_image_crop() method when processing avatar/banner image crop operations. The function accepts a user-controlled URL via the uwp_crop POST parameter and only validates it using esc_url() for sanitization and wp_check_filetype() for extension verification, without enforcing that the URL references a local uploads file. The URL is then passed to uwp_resizeThumbnailImage() which uses it in PHP image processing functions (getimagesize(), imagecreatefrom*()) that support URL wrappers and perform outbound HTTP requests. This makes it possible for authenticated attackers with subscriber-level access and above to coerce the WordPress server into making arbitrary HTTP requests to attacker-controlled or internal network destinations, enabling internal network scanning and potential access to sensitive services.
Published: 2026-04-11
Score: 5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authenticated Server‑Side Request Forgery
Action: Apply Patch
AI Analysis

Impact

UsersWP, a WordPress plugin that supplies front‑end login, user registration, and profile features, contains a blind Server‑Side Request Forgery flaw (CWE‑918). The defect is in the process_image_crop() function, which accepts a user‑controlled URL via the uwp_crop POST parameter. The code uses esc_url() and wp_check_filetype() for sanitization but does not enforce a local upload origin, allowing the URL to point to any remote or internal address. That URL is then handed to image functions that support URL wrappers, causing the WordPress server to make arbitrary outbound HTTP requests. An authenticated user with subscriber‑level permissions or higher can thus trigger the server to reach externally controlled sites or internal network targets, enabling internal scanning or access to sensitive services.

Affected Systems

All UsersWP releases by stiofansisland up to and including version 1.2.58 are affected. The vulnerability is confined to the image cropping functionality of that plugin and does not impact other WordPress core components or third‑party plugins.

Risk and Exploitability

The CVSS score of 5.0 denotes medium severity. EPSS data is unavailable, and the flaw is not listed in the CISA KEV catalog. Exploitation requires a legitimate authenticated user with subscriber or higher privileges and the submission of a crafted uwp_crop POST parameter containing an arbitrary URL. The attacker can coerce the WordPress server into making outbound HTTP requests to any destination, which can reveal internal network information or access privileged services. While the vulnerability does not grant direct code execution or privilege escalation, it provides a valuable foothold for further reconnaissance or internal attacks.

Generated by OpenCVE AI on April 11, 2026 at 02:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the UsersWP plugin to a version newer than 1.2.58 where this SSRF issue has been fixed
  • If an upgrade cannot be performed immediately, restrict or disable the image‑crop endpoint for authenticated users
  • Review user roles to ensure only users who truly need avatar or banner editing have subscriber‑level access
  • Monitor outbound HTTP traffic from the WordPress server for unexpected requests and adjust firewall rules to block malicious destinations

Generated by OpenCVE AI on April 11, 2026 at 02:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Stiofansisland
Stiofansisland userswp – Front-end Login Form, User Registration, User Profile & Members Directory Plugin For Wp
Wordpress
Wordpress wordpress
Vendors & Products Stiofansisland
Stiofansisland userswp – Front-end Login Form, User Registration, User Profile & Members Directory Plugin For Wp
Wordpress
Wordpress wordpress

Sat, 11 Apr 2026 01:30:00 +0000

Type Values Removed Values Added
Description The UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WP plugin for WordPress is vulnerable to blind Server-Side Request Forgery in all versions up to, and including, 1.2.58. This is due to insufficient URL origin validation in the process_image_crop() method when processing avatar/banner image crop operations. The function accepts a user-controlled URL via the uwp_crop POST parameter and only validates it using esc_url() for sanitization and wp_check_filetype() for extension verification, without enforcing that the URL references a local uploads file. The URL is then passed to uwp_resizeThumbnailImage() which uses it in PHP image processing functions (getimagesize(), imagecreatefrom*()) that support URL wrappers and perform outbound HTTP requests. This makes it possible for authenticated attackers with subscriber-level access and above to coerce the WordPress server into making arbitrary HTTP requests to attacker-controlled or internal network destinations, enabling internal network scanning and potential access to sensitive services.
Title UsersWP <= 1.2.58 - Authenticated (Subscriber+) Server-Side Request Forgery via 'uwp_crop' Parameter
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}


Subscriptions

Stiofansisland Userswp – Front-end Login Form, User Registration, User Profile & Members Directory Plugin For Wp
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-13T15:15:07.967Z

Reserved: 2026-03-27T10:53:03.694Z

Link: CVE-2026-4979

cve-icon Vulnrichment

Updated: 2026-04-13T15:11:31.741Z

cve-icon NVD

Status : Deferred

Published: 2026-04-11T02:16:02.463

Modified: 2026-04-24T18:00:32.033

Link: CVE-2026-4979

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:56:39Z

Weaknesses