### [CVE-2022-1037](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1037) ![](https://img.shields.io/static/v1?label=Product&message=EXMAGE%20%E2%80%93%20WordPress%20Image%20Links&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.0.7%3C%201.0.7%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)&color=brighgreen) ### Description The EXMAGE WordPress plugin before 1.0.7 does to ensure that images added via URLs are external images, which could lead to a blind SSRF issue by using local URLs ### POC #### Reference - https://wpscan.com/vulnerability/bd8555bd-8086-41d0-a1f7-3557bc3af957 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/iBLISSLabs/Server-Side-Request-Forgery-SSRF-on-EXMAGE---WordPress-Image-Links