The Frontis Blocks plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.1.6. This is due to insufficient restriction on the 'url' parameter in the 'template_proxy' function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application via the '/template-proxy/' and '/proxy-image/' endpoint.
Metrics
Affected Vendors & Products
References
History
Sat, 24 Jan 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Frontis Blocks plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.1.6. This is due to insufficient restriction on the 'url' parameter in the 'template_proxy' function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application via the '/template-proxy/' and '/proxy-image/' endpoint. | |
| Title | Frontis Blocks <= 1.1.6 - Unauthenticated Server-Side Request Forgery via 'url' Parameter | |
| Weaknesses | CWE-918 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-01-24T07:26:41.330Z
Reserved: 2026-01-09T14:24:31.880Z
Link: CVE-2026-0807
No data.
Status : Received
Published: 2026-01-24T08:16:07.580
Modified: 2026-01-24T08:16:07.580
Link: CVE-2026-0807
No data.
OpenCVE Enrichment
No data.