Home

Description

ProcessWire CMS version 3.0.255 and prior contain a server-side request forgery vulnerability in the admin panel's 'Add Module From URL' feature that allows authenticated administrators to supply arbitrary URLs to the module download parameter, causing the server to issue outbound HTTP requests to attacker-controlled internal or external hosts. Attackers can exploit differentiable error messages returned by the server to perform reliable internal network port scanning, host enumeration across RFC-1918 ranges, and potential access to cloud instance metadata endpoints.

PUBLISHED Reserved 2026-04-13 | Published 2026-04-15 | Updated 2026-04-15 | Assigner VulnCheck




MEDIUM: 6.1CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N

MEDIUM: 6.8CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

Problem types

CWE-918 Server-Side Request Forgery (SSRF)

Product status

Default status
unknown

Any version
affected

Credits

Piyush Kumar Shukla finder

References

gist.github.com/...arshukla/7514e5eed526fd9d20fcfc42ce8d0a82 technical-description exploit

processwire.com/ product

www.vulncheck.com/...sswire-cms-ssrf-via-add-module-from-url third-party-advisory

cve.org (CVE-2026-40500)

nvd.nist.gov (CVE-2026-40500)

Download JSON