Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1294: CWE-918 Server-Side Request Forgery (SSRF) in bplugins All In One Image Viewer Block – Gutenberg block to create image viewer with hyperlink

0
High
VulnerabilityCVE-2026-1294cvecve-2026-1294cwe-918
Published: Thu Feb 05 2026 (02/05/2026, 09:13:45 UTC)
Source: CVE Database V5
Vendor/Project: bplugins
Product: All In One Image Viewer Block – Gutenberg block to create image viewer with hyperlink

Description

The All In One Image Viewer Block plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.0.2 due to missing authorization and URL validation on the image-proxy REST API endpoint. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 19:03:50 UTC

Technical Analysis

CVE-2026-1294 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, found in the All In One Image Viewer Block plugin for WordPress, which is used to create image viewers with hyperlinks within the Gutenberg editor. The vulnerability affects all versions up to and including 1.0.2. It arises because the plugin’s image-proxy REST API endpoint does not enforce authorization checks nor validate URLs properly. This allows unauthenticated attackers to send crafted requests that the server then executes, effectively making the server perform arbitrary HTTP requests to internal or external systems. Such SSRF attacks can be leveraged to access internal services that are otherwise inaccessible externally, potentially exposing sensitive data or enabling further lateral movement within the network. The vulnerability has a CVSS 3.1 base score of 7.2 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N), indicating network exploitable, no privileges or user interaction required, with low complexity and a scope change affecting confidentiality and integrity. Although no public exploits are known yet and no patches have been published, the risk is significant given the plugin’s widespread use in WordPress environments. The vulnerability was reserved on January 21, 2026, and published on February 5, 2026, by Wordfence.

Potential Impact

The SSRF vulnerability in this WordPress plugin can have serious consequences for organizations worldwide. Attackers can exploit it to send unauthorized requests from the vulnerable web server to internal services, potentially bypassing firewalls and network segmentation. This can lead to unauthorized access to sensitive internal APIs, databases, or cloud metadata services, resulting in data leakage or unauthorized data modification. The integrity of internal systems can be compromised if attackers manipulate internal endpoints. Although availability impact is not directly indicated, the ability to query or modify internal services could facilitate further attacks that degrade service. Given WordPress’s extensive use globally, especially among small to medium businesses and content-driven websites, a large attack surface exists. The lack of authentication and user interaction requirements makes exploitation straightforward, increasing risk. Organizations relying on this plugin may face data breaches, compliance violations, and reputational damage if exploited.

Mitigation Recommendations

Immediate mitigation steps include disabling or uninstalling the All In One Image Viewer Block plugin until a patch is available. If disabling is not feasible, organizations should restrict access to the REST API endpoints related to the plugin using web application firewalls (WAFs) or reverse proxies to block unauthorized requests. Network-level controls should be implemented to prevent the web server from making arbitrary outbound requests, especially to internal IP ranges or sensitive services. Monitoring and logging of outbound HTTP requests from the web server can help detect suspicious activity. Administrators should audit their WordPress installations for this plugin and update to a patched version once released. Additionally, applying the principle of least privilege to internal services and enforcing strong network segmentation can limit the impact of SSRF exploitation. Security teams should also review internal service authentication mechanisms to prevent unauthorized access even if SSRF is exploited.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-21T17:10:18.154Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69846323f9fa50a62f145d38

Added to database: 2/5/2026, 9:30:11 AM

Last enriched: 2/26/2026, 7:03:50 PM

Last updated: 3/21/2026, 2:06:57 PM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses