WordPress Webmention Plugin SSRF Vulnerability (CVE-2026-0686)
The Webmention plugin for WordPress is vulnerable to Server-Side Request Forgery (SSRF) in versions up to 5.6.2, allowing unauthenticated attackers to make arbitrary web requests and potentially query or modify internal services.
The Webmention plugin for WordPress, a plugin designed to facilitate webmention communications, contains a Server-Side Request Forgery (SSRF) vulnerability identified as CVE-2026-0686. This vulnerability affects all versions of the plugin up to and including 5.6.2. The vulnerability resides within the ‘MF2::parse_authorpage’ function, accessible through the ‘Receiver::post’ function. An unauthenticated attacker can exploit this flaw to force the WordPress server to make HTTP requests to arbitrary external or internal locations. This can be leveraged to gather sensitive information from internal services, bypass firewalls, or potentially modify data depending on the accessibility of internal resources. The vulnerable code was present as of April 2026 in the version 5.6.2 branch.
Attack Chain
- An unauthenticated attacker crafts a malicious webmention request targeting a WordPress site running the vulnerable Webmention plugin.
- The WordPress site receives the webmention request and processes it using the ‘Receiver::post’ function.
- The ‘Receiver::post’ function calls the ‘MF2::parse_authorpage’ function to parse the author page URL specified in the webmention request.
- The ‘MF2::parse_authorpage’ function, due to lack of proper validation, makes an HTTP request to an attacker-controlled or internal URL specified within the webmention data.
- The WordPress server initiates a connection to the specified URL, potentially bypassing firewall restrictions or accessing internal services not directly exposed to the internet.
- The response from the targeted URL is processed by the plugin, potentially revealing information about the internal network or services.
- Depending on the targeted internal service and the attacker’s crafted request, the attacker might be able to modify data or execute commands.
- Successful exploitation leads to information disclosure, internal service compromise, or potential remote code execution depending on the vulnerable internal service.
Impact
Successful exploitation of CVE-2026-0686 allows unauthenticated attackers to perform Server-Side Request Forgery attacks against WordPress sites utilizing the Webmention plugin. This can lead to the exposure of sensitive information from internal services, such as configuration files or database credentials. Furthermore, attackers could potentially leverage this vulnerability to interact with and potentially compromise other internal systems that are not directly accessible from the internet, leading to a full compromise of the affected network. While the exact number of affected WordPress installations is unknown, the widespread use of the Webmention plugin makes this a significant risk.
Recommendation
- Upgrade the Webmention plugin to a version higher than 5.6.2 to patch CVE-2026-0686.
- Deploy the Sigma rule “Detect Webmention SSRF Attempt via Request to Internal IP” to identify exploitation attempts in web server logs.
- Monitor web server logs for unusual outbound connections originating from the WordPress server to internal IP addresses.
- Implement network segmentation to limit the impact of potential SSRF attacks, restricting access from the WordPress server to only necessary internal services.
Detection coverage 2
Detect Webmention SSRF Attempt via Request to Internal IP
highDetects potential SSRF attempts via the Webmention plugin by monitoring requests to internal IP addresses.
Detect Webmention SSRF Attempt via Request to Localhost
highDetects potential SSRF attempts via the Webmention plugin by monitoring requests to localhost.
Detection queries are kept inside the platform. Get full rules →