CVE-2026-24381

5.4 MEDIUM

📋 TL;DR

This Server-Side Request Forgery (SSRF) vulnerability in the PhotoMe WordPress theme allows attackers to make unauthorized requests from the vulnerable server to internal or external systems. It affects all PhotoMe theme installations running versions below 5.7.2. WordPress administrators using this theme are at risk.

💻 Affected Systems

Products:
  • ThemeGoods PhotoMe WordPress Theme
Versions: All versions before 5.7.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the PhotoMe theme active. Requires attacker access to vulnerable functionality.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, exfiltrate sensitive data, perform port scanning, or pivot to attack other internal systems from the compromised server.

🟠

Likely Case

Information disclosure from internal services, potential access to cloud metadata services, or limited internal network reconnaissance.

🟢

If Mitigated

Limited impact if proper network segmentation, egress filtering, and web application firewalls are in place to restrict outbound requests.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

SSRF vulnerabilities typically have low exploitation complexity once the vulnerable endpoint is identified. Authentication requirements are unclear from available information.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.7.2

Vendor Advisory: https://patchstack.com/database/Wordpress/Theme/photome/vulnerability/wordpress-photome-theme-5-7-2-server-side-request-forgery-ssrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Locate PhotoMe theme. 4. Click 'Update Now' if available. 5. If manual update required, download version 5.7.2 from ThemeGoods, upload via FTP, and activate.

🔧 Temporary Workarounds

Disable vulnerable functionality

all

Identify and disable the specific PhotoMe feature causing SSRF if not essential

Web Application Firewall rules

all

Implement WAF rules to block SSRF patterns and restrict outbound requests

🧯 If You Can't Patch

  • Implement strict network egress filtering to limit server outbound connections
  • Deploy a web application firewall with SSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Appearance > Themes for PhotoMe theme version. If version is below 5.7.2, system is vulnerable.

Check Version:

wp theme list --field=name,version --format=csv | grep photome

Verify Fix Applied:

Confirm PhotoMe theme version is 5.7.2 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from web server to internal IPs
  • Requests to metadata services (169.254.169.254, etc.)
  • Multiple failed outbound connection attempts

Network Indicators:

  • Web server making unexpected outbound HTTP requests
  • Requests to internal-only services from web server

SIEM Query:

source="web_server_logs" AND (dest_ip=169.254.169.254 OR dest_ip IN [RFC1918_ranges]) AND user_agent LIKE "%PhotoMe%"

🔗 References

📤 Share & Export