The Web Stories plugin for WordPress is vulnerable to Server-Side Request Forgery in versions up to, and including 1.24.0 due to insufficient validation of URLs supplied via the 'url' parameter found via the /v1/hotlink/proxy REST API Endpoint. This makes it possible for authenticated users to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-43065 | The Web Stories plugin for WordPress is vulnerable to Server-Side Request Forgery in versions up to, and including 1.24.0 due to insufficient validation of URLs supplied via the 'url' parameter found via the /v1/hotlink/proxy REST API Endpoint. This makes it possible for authenticated users to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Web Stories <= 1.24.0 - Server Side Request Forgery |
Mon, 05 May 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:01:48.973Z
Reserved: 2022-10-26T21:31:29.199Z
Link: CVE-2022-3708
Updated: 2024-08-03T01:20:57.117Z
Status : Modified
Published: 2022-10-28T19:15:10.140
Modified: 2026-04-08T18:17:30.060
Link: CVE-2022-3708
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD