EUVD-2026-17333

| CVE-2026-3881 MEDIUM
2026-03-31 WPScan GHSA-mxf6-4cfw-jjw8
5.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
None
Availability
None

Lifecycle Timeline

4
PoC Detected
Apr 01, 2026 - 14:24 vuln.today
Public exploit code
Analysis Generated
Mar 31, 2026 - 06:30 vuln.today
EUVD ID Assigned
Mar 31, 2026 - 06:30 euvd
EUVD-2026-17333
CVE Published
Mar 31, 2026 - 06:00 nvd
MEDIUM 5.8

Description

The Performance Monitor WordPress plugin through 1.0.6 does not validate a parameter before making a request to it, which could allow unauthenticated users to perform SSRF attacks

Analysis

Unauthenticated Server-Side Request Forgery (SSRF) in Performance Monitor WordPress plugin through version 1.0.6 allows remote attackers to perform arbitrary HTTP requests by exploiting insufficient parameter validation. The vulnerability enables attackers without authentication to interact with internal network resources and services accessible from the WordPress server, potentially leading to information disclosure, lateral movement, or interaction with backend systems.

Sign in for full analysis, threat intelligence, and remediation guidance.

Priority Score

49
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +29
POC: +20

Share

EUVD-2026-17333 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy