WordPress Contest Gallery Plugin <= 28.1.2.1 is vulnerable to a medium priority Server Side Request Forgery (SSRF)

Medium priority Mitigate with Patchstack
<= 28.1.2.1Vulnerable version(s)
28.1.2.2Patched version
10 Mar, 2026 by Patchstack

Get the fastest vulnerability mitigation with Patchstack!

Get started

Risks

CVSS 6.4

This vulnerability is moderately dangerous and expected to become exploited. Vulnerabilities like this one are used in mass-exploit campaigns. Attackers use these to attack thousands of websites at a time, regardless of traffic size or popularity. Learn more.

As immediate action, update the affected plugin. If you're unable to do so, ask your hosting provider or web developer for help.

6.4

Server Side Request Forgery (SSRF)

This could allow a malicious actor to cause a website to execute website requests to an arbitrary domain of the attacker. This could allow a malicious actor to find sensitive information of other services running on the system.

CVSS score is a way to evaluate and rank reported vulnerabilities in a standardized and repeatable way but which is not ideal for WordPress.

Solutions

We advise to mitigate or resolve the vulnerability immediately.

Automatically mitigate vulnerabilities and keep your websites safe.

Patchstack has issued a mitigation rule to block any attacks until you have updated to a patched version.

Get the fastest vulnerability mitigation with Patchstack!

Get started

Update to version 28.1.2.2 or later.

Update to version 28.1.2.2 or later to resolve the vulnerability. Patchstack users can turn on auto-update for vulnerable plugins only.

Details

Have additional information or questions about this entry? Let us know.

Timeline

Reported byProfile Imagelilmingwa13

9 Dec, 2025

Weekly WordPress security intelligence delivered to your inbox.