CVE-2026-0632: CWE-918 Server-Side Request Forgery (SSRF) in techjewel Fluent Forms Pro Add On Pack
The Fluent Forms Pro Add On Pack plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.1.12 via the 'saveDataSource' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
AI Analysis
Technical Summary
CVE-2026-0632 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Fluent Forms Pro Add On Pack plugin for WordPress, affecting all versions up to and including 6.1.12. The vulnerability resides in the 'saveDataSource' function, which improperly validates or restricts URLs or endpoints that can be requested by the plugin. An authenticated attacker with Subscriber-level privileges or higher can exploit this flaw to cause the server to send crafted HTTP requests to arbitrary locations, including internal network services that are not directly accessible externally. This can lead to unauthorized querying or modification of internal resources, potentially exposing sensitive information or enabling further attacks within the internal network. The vulnerability does not require user interaction beyond authentication, and the attack surface includes any WordPress installation using the vulnerable plugin. The CVSS v3.1 score of 5.4 reflects a medium severity, considering the network attack vector, low complexity, requirement for privileges, and limited impact on confidentiality and integrity. No public exploits are currently known, but the vulnerability's presence in a widely used WordPress plugin makes it a notable risk. The lack of an official patch at the time of reporting necessitates immediate mitigation efforts by administrators.
Potential Impact
For European organizations, this SSRF vulnerability poses a significant risk, particularly for those relying on WordPress sites with the Fluent Forms Pro Add On Pack plugin installed. Exploitation could allow attackers to pivot from the web server into internal networks, accessing sensitive internal services such as databases, intranet applications, or cloud metadata endpoints. This could lead to data leakage, unauthorized data modification, or further compromise of internal systems. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and government, could face regulatory and reputational damage if internal data is exposed. Additionally, the vulnerability could be leveraged to bypass network segmentation controls, undermining perimeter defenses. The medium severity score suggests a moderate but tangible threat, especially in environments where user privileges are not tightly controlled or where internal services are insufficiently protected. The requirement for authenticated access somewhat limits the attack scope but does not eliminate risk, as Subscriber-level accounts are commonly available in many WordPress setups.
Mitigation Recommendations
1. Immediate mitigation should focus on restricting access to the Fluent Forms Pro Add On Pack plugin features, limiting usage to trusted administrators only. 2. Implement strict role-based access control (RBAC) in WordPress to minimize the number of users with Subscriber-level or higher privileges. 3. Employ network segmentation and firewall rules to restrict the web server's ability to initiate requests to sensitive internal services, effectively reducing the SSRF attack surface. 4. Monitor web server logs and application logs for unusual outbound HTTP requests or patterns indicative of SSRF exploitation attempts. 5. Disable or remove the vulnerable plugin if it is not essential to operations until an official patch is released. 6. Once a patch becomes available, apply it promptly and verify the update's effectiveness through testing. 7. Consider deploying Web Application Firewalls (WAFs) with rules designed to detect and block SSRF attempts targeting the vulnerable function. 8. Educate administrators and users about the risks of privilege misuse and encourage regular audits of user permissions.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2026-0632: CWE-918 Server-Side Request Forgery (SSRF) in techjewel Fluent Forms Pro Add On Pack
Description
The Fluent Forms Pro Add On Pack plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.1.12 via the 'saveDataSource' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
AI-Powered Analysis
Technical Analysis
CVE-2026-0632 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Fluent Forms Pro Add On Pack plugin for WordPress, affecting all versions up to and including 6.1.12. The vulnerability resides in the 'saveDataSource' function, which improperly validates or restricts URLs or endpoints that can be requested by the plugin. An authenticated attacker with Subscriber-level privileges or higher can exploit this flaw to cause the server to send crafted HTTP requests to arbitrary locations, including internal network services that are not directly accessible externally. This can lead to unauthorized querying or modification of internal resources, potentially exposing sensitive information or enabling further attacks within the internal network. The vulnerability does not require user interaction beyond authentication, and the attack surface includes any WordPress installation using the vulnerable plugin. The CVSS v3.1 score of 5.4 reflects a medium severity, considering the network attack vector, low complexity, requirement for privileges, and limited impact on confidentiality and integrity. No public exploits are currently known, but the vulnerability's presence in a widely used WordPress plugin makes it a notable risk. The lack of an official patch at the time of reporting necessitates immediate mitigation efforts by administrators.
Potential Impact
For European organizations, this SSRF vulnerability poses a significant risk, particularly for those relying on WordPress sites with the Fluent Forms Pro Add On Pack plugin installed. Exploitation could allow attackers to pivot from the web server into internal networks, accessing sensitive internal services such as databases, intranet applications, or cloud metadata endpoints. This could lead to data leakage, unauthorized data modification, or further compromise of internal systems. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and government, could face regulatory and reputational damage if internal data is exposed. Additionally, the vulnerability could be leveraged to bypass network segmentation controls, undermining perimeter defenses. The medium severity score suggests a moderate but tangible threat, especially in environments where user privileges are not tightly controlled or where internal services are insufficiently protected. The requirement for authenticated access somewhat limits the attack scope but does not eliminate risk, as Subscriber-level accounts are commonly available in many WordPress setups.
Mitigation Recommendations
1. Immediate mitigation should focus on restricting access to the Fluent Forms Pro Add On Pack plugin features, limiting usage to trusted administrators only. 2. Implement strict role-based access control (RBAC) in WordPress to minimize the number of users with Subscriber-level or higher privileges. 3. Employ network segmentation and firewall rules to restrict the web server's ability to initiate requests to sensitive internal services, effectively reducing the SSRF attack surface. 4. Monitor web server logs and application logs for unusual outbound HTTP requests or patterns indicative of SSRF exploitation attempts. 5. Disable or remove the vulnerable plugin if it is not essential to operations until an official patch is released. 6. Once a patch becomes available, apply it promptly and verify the update's effectiveness through testing. 7. Consider deploying Web Application Firewalls (WAFs) with rules designed to detect and block SSRF attempts targeting the vulnerable function. 8. Educate administrators and users about the risks of privilege misuse and encourage regular audits of user permissions.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-06T00:21:53.194Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6989c9094b57a58fa148f1b2
Added to database: 2/9/2026, 11:46:17 AM
Last enriched: 2/9/2026, 12:00:51 PM
Last updated: 2/9/2026, 2:05:48 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10465: CWE-434 Unrestricted Upload of File with Dangerous Type in Birtech Information Technologies Industry and Trade Ltd. Co. Sensaway
High9th February – Threat Intelligence Report
MediumCVE-2025-10464: CWE-922 Insecure Storage of Sensitive Information in Birtech Information Technologies Industry and Trade Ltd. Co. Senseway
MediumCVE-2025-10463: CWE-287 Improper Authentication in Birtech Information Technologies Industry and Trade Ltd. Co. Senseway
HighSmarterTools Hit by Ransomware via Vulnerability in Its Own Product
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.