PixelYourSite Pro WordPress Plugin SSRF Vulnerability (CVE-2026-7049)
The PixelYourSite Pro WordPress plugin is vulnerable to server-side request forgery (SSRF), allowing unauthenticated attackers to make arbitrary web requests from the server, potentially querying or modifying internal services.
CVE-2026-7049 is a server-side request forgery (SSRF) vulnerability found in the PixelYourSite Pro WordPress plugin. Specifically, all versions up to and including 12.5.0.1 are affected. This vulnerability allows unauthenticated attackers to send requests to arbitrary internal or external resources, as viewed from the web server. Although the fetched response bodies are not directly returned to the attacker (making it a blind SSRF), the application parses these responses internally, creating opportunities for reconnaissance and potentially for exploiting vulnerable internal services. Successful exploitation could expose sensitive information or allow unauthorized modification of internal systems.
Attack Chain
- An unauthenticated attacker identifies the
scan_videoparameter as an SSRF entry point. - The attacker crafts a malicious HTTP request targeting the WordPress server with the vulnerable PixelYourSite Pro plugin. The request includes the
scan_videoparameter set to a URL pointing to an internal resource (e.g., internal IP address or hostname). - The WordPress server receives the malicious request.
- The PixelYourSite Pro plugin processes the request and initiates an HTTP request to the URL specified in the
scan_videoparameter. - The WordPress server makes a request to the internal resource.
- The response from the internal resource is received by the WordPress server.
- The PixelYourSite Pro plugin parses the response body, potentially revealing information about the internal service.
- Depending on the targeted internal service and the attacker’s crafted request, the attacker might be able to modify information or execute commands on the internal service, even though the response is not directly returned to the attacker.
Impact
Successful exploitation of CVE-2026-7049 allows an unauthenticated attacker to perform reconnaissance of internal network resources. The blind nature of the SSRF limits the attacker’s immediate visibility into the response, but internal parsing of the response allows for potential information disclosure and exploitation of vulnerable internal services. The scope of the impact depends heavily on the configuration of the internal network and the services exposed.
Recommendation
- Upgrade the PixelYourSite Pro plugin to a version greater than 12.5.0.1 to patch CVE-2026-7049.
- Deploy the Sigma rule
Detect Suspicious PixelYourSite Pro SSRF Attemptsto monitor for exploitation attempts targeting thescan_videoparameter. - Review and restrict internal network access to sensitive services to mitigate the potential impact of SSRF vulnerabilities.
Detection coverage 2
Detect Suspicious PixelYourSite Pro SSRF Attempts
highDetects attempts to exploit the SSRF vulnerability (CVE-2026-7049) in the PixelYourSite Pro WordPress plugin by monitoring requests to the scan_video parameter with potentially malicious URLs.
Detect PixelYourSite Pro SSRF Attempts to Internal Metadata
highDetects attempts to exploit the SSRF vulnerability (CVE-2026-7049) in the PixelYourSite Pro WordPress plugin by monitoring requests to the scan_video parameter targeting cloud metadata endpoints.
Detection queries are kept inside the platform. Get full rules →