Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2026-40500— ProcessWire CMS SSRF via Add Module From URL

CVSS 6.8 · Medium EPSS 0.01% · P2
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-40500

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
ProcessWire CMS SSRF via Add Module From URL
Source: NVD (National Vulnerability Database)
Vulnerability Description
ProcessWire CMS version 3.0.255 and prior contain a server-side request forgery vulnerability in the admin panel's 'Add Module From URL' feature that allows authenticated administrators to supply arbitrary URLs to the module download parameter, causing the server to issue outbound HTTP requests to attacker-controlled internal or external hosts. Attackers can exploit differentiable error messages returned by the server to perform reliable internal network port scanning, host enumeration across RFC-1918 ranges, and potential access to cloud instance metadata endpoints.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
服务端请求伪造(SSRF)
Source: NVD (National Vulnerability Database)
Vulnerability Title
ProcessWire CMS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
ProcessWire CMS是ProcessWire开源的一个灵活的内容管理系统。 ProcessWire CMS 3.0.255及之前版本存在安全漏洞,该漏洞源于管理员面板的Add Module From URL功能存在服务端请求伪造问题,可能导致内部网络端口扫描、主机枚举或访问云实例元数据端点。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
processwireprocesswire 0 ~ 3.0.255 -

II. Public POCs for CVE-2026-40500

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-40500

登录查看更多情报信息。

Proof of Concept for CVE-2026-40500 (1)

IV. Related Vulnerabilities

V. Comments for CVE-2026-40500

No comments yet


Leave a comment