Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total2
Critical0
High1
Medium1
Reset
Showing 1-2 of 2 records
Threat Entry Updated 2026-04-15

CVE-2026-3881 - Performance Monitor Plugin

The Performance Monitor WordPress plugin through 1.0.6 does not validate a parameter before making a request to it, which could allow unauthenticated users to perform SSRF attacks

PLUGIN Performance Monitor

CVE-2026-3881

MEDIUM CVSS 5.8 2026-03-31
Threat Entry Updated 2026-03-23

CVE-2026-1648 - Performance Monitor Plugin

The Performance Monitor plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.0.6. This is due to insufficient validation of the 'url' parameter in the '/wp-json/performance-monitor/v1/curl_data' REST API endpoint. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations, including internal services, via the Gopher protocol and other dangerous protocols. This can be exploited to achieve Remote Code Execution by chaining with services like Redis.

PLUGIN Performance Monitor

CVE-2026-1648

HIGH CVSS 7.2 2026-03-21
Scroll to top