Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0632: CWE-918 Server-Side Request Forgery (SSRF) in techjewel Fluent Forms Pro Add On Pack

0
Medium
VulnerabilityCVE-2026-0632cvecve-2026-0632cwe-918
Published: Mon Feb 09 2026 (02/09/2026, 11:22:35 UTC)
Source: CVE Database V5
Vendor/Project: techjewel
Product: Fluent Forms Pro Add On Pack

Description

The Fluent Forms Pro Add On Pack plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.1.12 via the 'saveDataSource' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

AI-Powered Analysis

AILast updated: 02/09/2026, 12:00:51 UTC

Technical Analysis

CVE-2026-0632 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Fluent Forms Pro Add On Pack plugin for WordPress, affecting all versions up to and including 6.1.12. The vulnerability resides in the 'saveDataSource' function, which improperly validates or restricts URLs or endpoints that can be requested by the plugin. An authenticated attacker with Subscriber-level privileges or higher can exploit this flaw to cause the server to send crafted HTTP requests to arbitrary locations, including internal network services that are not directly accessible externally. This can lead to unauthorized querying or modification of internal resources, potentially exposing sensitive information or enabling further attacks within the internal network. The vulnerability does not require user interaction beyond authentication, and the attack surface includes any WordPress installation using the vulnerable plugin. The CVSS v3.1 score of 5.4 reflects a medium severity, considering the network attack vector, low complexity, requirement for privileges, and limited impact on confidentiality and integrity. No public exploits are currently known, but the vulnerability's presence in a widely used WordPress plugin makes it a notable risk. The lack of an official patch at the time of reporting necessitates immediate mitigation efforts by administrators.

Potential Impact

For European organizations, this SSRF vulnerability poses a significant risk, particularly for those relying on WordPress sites with the Fluent Forms Pro Add On Pack plugin installed. Exploitation could allow attackers to pivot from the web server into internal networks, accessing sensitive internal services such as databases, intranet applications, or cloud metadata endpoints. This could lead to data leakage, unauthorized data modification, or further compromise of internal systems. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and government, could face regulatory and reputational damage if internal data is exposed. Additionally, the vulnerability could be leveraged to bypass network segmentation controls, undermining perimeter defenses. The medium severity score suggests a moderate but tangible threat, especially in environments where user privileges are not tightly controlled or where internal services are insufficiently protected. The requirement for authenticated access somewhat limits the attack scope but does not eliminate risk, as Subscriber-level accounts are commonly available in many WordPress setups.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting access to the Fluent Forms Pro Add On Pack plugin features, limiting usage to trusted administrators only. 2. Implement strict role-based access control (RBAC) in WordPress to minimize the number of users with Subscriber-level or higher privileges. 3. Employ network segmentation and firewall rules to restrict the web server's ability to initiate requests to sensitive internal services, effectively reducing the SSRF attack surface. 4. Monitor web server logs and application logs for unusual outbound HTTP requests or patterns indicative of SSRF exploitation attempts. 5. Disable or remove the vulnerable plugin if it is not essential to operations until an official patch is released. 6. Once a patch becomes available, apply it promptly and verify the update's effectiveness through testing. 7. Consider deploying Web Application Firewalls (WAFs) with rules designed to detect and block SSRF attempts targeting the vulnerable function. 8. Educate administrators and users about the risks of privilege misuse and encourage regular audits of user permissions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-06T00:21:53.194Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6989c9094b57a58fa148f1b2

Added to database: 2/9/2026, 11:46:17 AM

Last enriched: 2/9/2026, 12:00:51 PM

Last updated: 2/9/2026, 2:05:48 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats