Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-gmwr-9j4p-96vm | ProcessWire: server-side request forgery vulnerability in the admin panel's 'Add Module From URL' feature |
Thu, 16 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 15 Apr 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Processwire
Processwire processwire |
|
| Vendors & Products |
Processwire
Processwire processwire |
Wed, 15 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ProcessWire CMS version 3.0.255 and prior contain a server-side request forgery vulnerability in the admin panel's 'Add Module From URL' feature that allows authenticated administrators to supply arbitrary URLs to the module download parameter, causing the server to issue outbound HTTP requests to attacker-controlled internal or external hosts. Attackers can exploit differentiable error messages returned by the server to perform reliable internal network port scanning, host enumeration across RFC-1918 ranges, and potential access to cloud instance metadata endpoints. | |
| Title | ProcessWire CMS SSRF via Add Module From URL | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-16T13:38:15.341Z
Reserved: 2026-04-13T20:29:02.808Z
Link: CVE-2026-40500
Updated: 2026-04-16T13:38:11.707Z
Status : Deferred
Published: 2026-04-15T22:17:22.377
Modified: 2026-05-01T14:41:28.180
Link: CVE-2026-40500
No data.
OpenCVE Enrichment
Updated: 2026-04-16T02:30:21Z
Github GHSA