The ZD YouTube FLV Player plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.2.6 via the $_GET['image'] parameter. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Project Subscriptions
No data.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-27610 | The ZD YouTube FLV Player plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.2.6 via the $_GET['image'] parameter. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 08 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | ZD YouTube FLV Player <= 1.2.6 - Server-Side Request Forgery | |
| Weaknesses | CWE-918 |
Thu, 26 Feb 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:33:40.807Z
Reserved: 2024-03-19T18:34:00.092Z
Link: CVE-2024-2663
Updated: 2024-08-01T19:18:48.215Z
Status : Awaiting Analysis
Published: 2024-04-30T09:15:07.050
Modified: 2026-04-08T19:21:09.873
Link: CVE-2024-2663
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD