Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0632: CWE-918 Server-Side Request Forgery (SSRF) in techjewel Fluent Forms Pro Add On Pack

0
Medium
VulnerabilityCVE-2026-0632cvecve-2026-0632cwe-918
Published: Mon Feb 09 2026 (02/09/2026, 11:22:35 UTC)
Source: CVE Database V5
Vendor/Project: techjewel
Product: Fluent Forms Pro Add On Pack

Description

The Fluent Forms Pro Add On Pack plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.1.12 via the 'saveDataSource' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 18:32:15 UTC

Technical Analysis

CVE-2026-0632 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Fluent Forms Pro Add On Pack plugin for WordPress, affecting all versions up to and including 6.1.12. SSRF vulnerabilities allow attackers to induce the server-side application to make HTTP requests to arbitrary domains or IP addresses, often internal or protected resources not directly accessible externally. In this case, the vulnerability resides in the 'saveDataSource' function, which processes input from authenticated users. An attacker with at least Subscriber-level privileges can exploit this flaw to send crafted requests originating from the web server itself. This can be leveraged to access internal services, potentially bypassing firewall restrictions, and to query or modify internal data. The vulnerability does not require user interaction beyond authentication and has a low attack complexity, making exploitation feasible in environments where user accounts are compromised or created. The CVSS v3.1 base score is 5.4, reflecting limited confidentiality and integrity impacts but no availability impact. No public exploits have been reported yet, but the risk remains significant due to the widespread use of WordPress and this plugin. The vulnerability underscores the risk of SSRF in web applications that accept user input to perform backend HTTP requests without proper validation or access controls.

Potential Impact

The impact of CVE-2026-0632 can be significant for organizations running WordPress sites with the vulnerable Fluent Forms Pro Add On Pack plugin. Attackers with low-level authenticated access can exploit the SSRF vulnerability to pivot into internal networks, accessing sensitive internal services such as databases, metadata services, or administrative interfaces that are not exposed externally. This can lead to unauthorized data disclosure, modification of internal resources, or further compromise of the network. While the vulnerability does not directly cause denial of service, the ability to query and modify internal services can facilitate lateral movement or privilege escalation attacks. Organizations relying on this plugin for form management may face data integrity risks and potential breaches of confidentiality. The medium CVSS score reflects that the attack requires authentication but is otherwise straightforward, making it a moderate but actionable threat. The absence of known exploits in the wild suggests that proactive mitigation can prevent exploitation. However, given the popularity of WordPress and the plugin, the vulnerability poses a global risk, especially to organizations with less stringent access controls or network segmentation.

Mitigation Recommendations

To mitigate CVE-2026-0632, organizations should: 1) Immediately update the Fluent Forms Pro Add On Pack plugin to a patched version once available from the vendor. 2) Restrict plugin access to only trusted users and minimize the number of users with Subscriber-level or higher privileges to reduce the attack surface. 3) Implement strict input validation and sanitization on any user-supplied data that can influence backend HTTP requests. 4) Employ network segmentation and firewall rules to limit the web server's ability to access sensitive internal services, reducing the impact of SSRF exploitation. 5) Monitor outbound HTTP requests from the web server for unusual or unauthorized destinations, using web application firewalls or intrusion detection systems. 6) Consider disabling or restricting the 'saveDataSource' functionality if not required. 7) Conduct regular audits of user accounts and permissions to prevent unauthorized access. 8) Use security plugins or tools that can detect SSRF patterns or anomalous behavior in WordPress environments. These steps go beyond generic advice by focusing on access control, network-level restrictions, and monitoring tailored to the SSRF threat vector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-06T00:21:53.194Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6989c9094b57a58fa148f1b2

Added to database: 2/9/2026, 11:46:17 AM

Last enriched: 2/26/2026, 6:32:15 PM

Last updated: 3/26/2026, 4:23:40 PM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses