<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>InfusedWoo Pro — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/infusedwoo-pro/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 09:17:13 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/infusedwoo-pro/feed.xml" rel="self" type="application/rss+xml"/><item><title>InfusedWoo Pro WordPress Plugin Arbitrary File Read Vulnerability (CVE-2026-6514)</title><link>https://feed.craftedsignal.io/briefs/2026-05-infusedwoo-file-read/</link><pubDate>Thu, 14 May 2026 09:17:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-infusedwoo-file-read/</guid><description>The InfusedWoo Pro plugin for WordPress is vulnerable to arbitrary file read in versions up to 5.1.2, allowing unauthenticated attackers to make web requests to arbitrary locations, potentially querying and modifying information from internal services.</description><content:encoded><![CDATA[<p>The InfusedWoo Pro plugin for WordPress is susceptible to an arbitrary file read vulnerability (CVE-2026-6514) affecting versions up to and including 5.1.2. This flaw allows unauthenticated attackers to perform server-side request forgery (SSRF) attacks by manipulating the <code>popup_submit</code> functionality. By crafting malicious web requests, attackers can potentially access sensitive information from internal services or resources accessible to the WordPress server, posing a significant risk to data confidentiality and system integrity. The vulnerability was reported by Wordfence.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable InfusedWoo Pro plugin (version &lt;= 5.1.2).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>popup_submit</code> endpoint.</li>
<li>The crafted request contains a URL pointing to an internal resource or service.</li>
<li>The WordPress server, acting on behalf of the attacker, makes a request to the specified internal URL.</li>
<li>The response from the internal resource is returned to the attacker, effectively bypassing access controls.</li>
<li>The attacker reads sensitive files or queries internal services, gathering information about the target network.</li>
<li>The attacker may potentially leverage the SSRF vulnerability to modify data on internal services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-6514) allows an unauthenticated attacker to read arbitrary files and potentially interact with internal services accessible to the WordPress server. This could lead to the exposure of sensitive data, such as configuration files, database credentials, or API keys. It could also enable further attacks, such as privilege escalation or lateral movement within the internal network. The severity of the impact depends on the type and sensitivity of the data and services exposed through the SSRF vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the InfusedWoo Pro plugin to a version higher than 5.1.2 to patch CVE-2026-6514.</li>
<li>Deploy the Sigma rule &ldquo;Detect CVE-2026-6514 Exploitation — InfusedWoo Pro Arbitrary File Read&rdquo; to detect exploitation attempts targeting the vulnerable <code>popup_submit</code> endpoint.</li>
<li>Review webserver logs for unusual requests to <code>popup_submit</code> as described in the Sigma rule, especially those containing suspicious URLs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>cve</category><category>wordpress</category><category>plugin</category><category>arbitrary file read</category><category>ssrf</category></item></channel></rss>