The Seraphinite Accelerator plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.20.52 via the OnAdminApi_HtmlCheck function. This makes it possible for authenticated attackers, with subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
History

Wed, 08 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
Title Seraphinite Accelerator <= 2.20.52 - Authenticated (Subscriber+) Server-Side Request Forgery in OnAdminApi_HtmlCheck

Wed, 25 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 16 Jan 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared S-sols
S-sols seraphinite Accelerator
Weaknesses CWE-918
CPEs cpe:2.3:a:s-sols:seraphinite_accelerator:*:*:*:*:*:wordpress:*:*
Vendors & Products S-sols
S-sols seraphinite Accelerator

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-02-28T06:46:47.074Z

Updated: 2026-04-08T16:33:55.854Z

Reserved: 2024-02-15T20:38:44.481Z

Link: CVE-2024-1568

cve-icon Vulnrichment

Updated: 2024-08-01T18:40:21.352Z

cve-icon NVD

Status : Modified

Published: 2024-02-28T07:15:08.713

Modified: 2026-04-08T17:18:22.090

Link: CVE-2024-1568

cve-icon Redhat

No data.