LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-1313 - Vulnerability Analysis

HighCVSS: 8.3

Last Updated: March 23, 2026

WordPress MimeTypes Link Icons - Server-Side Request Forgery

Published: March 21, 2026Updated: March 23, 2026Remote Exploitable

Overview

WordPress MimeTypes Link Icons plugin <= 3.2.20 contains a server-side request forgery caused by outbound HTTP requests to user-controlled URLs without validation when "Show file size" is enabled, letting authenticated contributors and above make arbitrary web requests originating from the application.

Severity & Score

Severity: High
CVSS Score: 8.3
EPSS Score: 3.6%(Probability of exploitation in next 30 days)

Impact

Authenticated attackers can make arbitrary web requests from the server, potentially accessing or modifying internal services.

Mitigation

Update to the latest version beyond 3.2.20.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 21, 2026

🟠 CVE-2026-1313 - High (8.3) The MimeTypes Link Icons plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.2.20. This is due to the plugin making outbound HTTP requests to user-controlled URLs without proper validation when... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-1313/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-1313
Severity
High
CVSS Score
8.3
Type
server_side_request_forgery
Status
unconfirmed
EPSS
3.6%
Social Posts
1

CWE

  • CWE-918

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

EPSS Score

3.6%Probability of exploitation in the next 30 days