Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.2
Performance Monitor plugin for WordPress allows attackers to target internal services
CVE-2026-1648
Summary
The Performance Monitor plugin for WordPress has a security flaw that lets attackers make requests to internal services. This could lead to sensitive data being accessed or systems being compromised. Update the plugin to the latest version to fix this issue.
Original title
The Performance Monitor plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.0.6. This is due to insufficient validation of the 'url' parameter ...
Original description
The Performance Monitor plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.0.6. This is due to insufficient validation of the 'url' parameter in the '/wp-json/performance-monitor/v1/curl_data' REST API endpoint. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations, including internal services, via the Gopher protocol and other dangerous protocols. This can be exploited to achieve Remote Code Execution by chaining with services like Redis.
nvd CVSS3.1
7.2
Vulnerability type
CWE-918
Server-Side Request Forgery (SSRF)
Published: 21 Mar 2026 · Updated: 21 Mar 2026 · First seen: 21 Mar 2026