Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1648: CWE-918 Server-Side Request Forgery (SSRF) in qrolic Performance Monitor

0
High
VulnerabilityCVE-2026-1648cvecve-2026-1648cwe-918
Published: Sat Mar 21 2026 (03/21/2026, 03:27:02 UTC)
Source: CVE Database V5
Vendor/Project: qrolic
Product: Performance Monitor

Description

CVE-2026-1648 is a high-severity Server-Side Request Forgery (SSRF) vulnerability in the qrolic Performance Monitor WordPress plugin versions up to 1. 0. 6. It arises from insufficient validation of the 'url' parameter in the '/wp-json/performance-monitor/v1/curl_data' REST API endpoint, allowing unauthenticated attackers to send arbitrary requests, including via the Gopher protocol. This can be leveraged to access internal services and potentially achieve Remote Code Execution (RCE) by chaining with vulnerable services like Redis. The vulnerability requires no authentication or user interaction and affects all versions of the plugin. Although no known exploits are currently in the wild, the CVSS score of 7. 2 indicates a significant risk. Organizations using this plugin should prioritize patching or mitigating this flaw to prevent exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/21/2026, 04:31:06 UTC

Technical Analysis

The qrolic Performance Monitor plugin for WordPress contains a critical SSRF vulnerability (CVE-2026-1648) affecting all versions up to 1.0.6. The flaw exists due to inadequate validation of the 'url' parameter in the REST API endpoint '/wp-json/performance-monitor/v1/curl_data'. This endpoint accepts URLs without proper sanitization, enabling unauthenticated attackers to craft requests that the server will execute internally. Attackers can exploit this to send requests to arbitrary internal or external resources, including those accessible only within the internal network. Notably, the vulnerability supports dangerous protocols such as Gopher, which can be used to interact with backend services like Redis. By chaining SSRF with Redis commands, attackers may achieve Remote Code Execution on the hosting server. The vulnerability does not require any privileges or user interaction, increasing its risk. While no public exploits have been reported yet, the potential for severe impact is high given the ease of exploitation and the possibility of RCE. The vulnerability is classified under CWE-918 (SSRF), and the CVSS v3.1 base score is 7.2 (High), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and partial confidentiality and integrity impact.

Potential Impact

If exploited, this vulnerability allows attackers to perform unauthorized internal network scanning and access, potentially reaching sensitive internal services that are not exposed externally. The ability to use the Gopher protocol to interact with services like Redis can lead to Remote Code Execution, allowing full compromise of the affected WordPress server. This can result in data theft, service disruption, or use of the compromised server as a pivot point for further attacks within the network. The impact extends beyond confidentiality to integrity, as attackers can manipulate internal services or data. Given the plugin's integration with WordPress, a widely used CMS, many organizations could be exposed, especially those relying on this plugin for performance monitoring. The lack of authentication and user interaction requirements increases the likelihood of automated exploitation attempts once public exploit code becomes available.

Mitigation Recommendations

1. Immediate mitigation involves disabling or uninstalling the qrolic Performance Monitor plugin until a patched version is released. 2. If disabling is not feasible, restrict access to the vulnerable REST API endpoint via web application firewalls (WAFs) or reverse proxies by blocking or filtering requests to '/wp-json/performance-monitor/v1/curl_data'. 3. Implement network segmentation and firewall rules to limit the WordPress server's ability to initiate outbound connections to internal services, especially blocking protocols like Gopher. 4. Monitor logs for unusual outbound requests originating from the WordPress server, particularly to internal IP ranges or uncommon protocols. 5. Once available, promptly apply vendor patches addressing this vulnerability. 6. Conduct internal scans to detect any signs of compromise or lateral movement stemming from this vulnerability. 7. Educate administrators about the risks of SSRF and the importance of validating user-supplied URLs in plugins and custom code.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-29T19:03:40.942Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69be1807f4197a8e3b783c43

Added to database: 3/21/2026, 4:01:11 AM

Last enriched: 3/21/2026, 4:31:06 AM

Last updated: 3/21/2026, 3:54:43 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses