MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar V…

MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar V…

by | Feb 13, 2026 | Plugins

Attack Vectors

CVE-2026-1249 is a Medium severity Server-Side Request Forgery (SSRF) issue (CVSS 5.0) affecting the WordPress plugin MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar (slug: mp3-music-player-by-sonaar) in versions 5.3 through 5.10.

The vulnerability can be exploited by an authenticated WordPress user with Author permissions (or higher). In practical terms, this means the risk is highest in organizations where multiple internal users, contractors, or partners have content-publishing access, or where an Author account could be compromised through credential theft.

The issue is triggered through the plugin’s load_lyrics_ajax_callback functionality, enabling an attacker to make web requests from the website/server to arbitrary locations. Because the requests originate from your site, they can potentially reach destinations that are not directly accessible from the public internet.

Security Weakness

SSRF occurs when a web application can be convinced to fetch a URL or network resource chosen by an attacker. In this case, the vulnerable versions of MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar allow authenticated users (Author+) to initiate server-originated requests via the plugin’s lyrics-loading feature.

This weakness matters because it can blur the line between “public website traffic” and “internal network access.” Even if internal tools, cloud metadata endpoints, staging dashboards, or service panels are not publicly reachable, they may still be reachable from the WordPress hosting environment—making them more exposed than leadership teams typically assume.

Technical or Business Impacts

From a business-risk perspective, SSRF can enable internal reconnaissance (discovering internal services) and data exposure by querying internal endpoints. The published summary also notes it may be used to query and modify information from internal services, which can escalate impact beyond simple information gathering depending on what your environment can reach.

Potential outcomes include increased likelihood of a broader incident: unauthorized access to internal applications, exposure of sensitive operational data, disruption of business workflows, or added regulatory/compliance risk if protected data becomes accessible. Even at Medium severity, the combination of “authenticated user required” and “server-originated requests” can be significant for organizations with many users or complex internal systems.

Remediation: Update the plugin to version 5.11 or a newer patched version. Also review who has Author (or higher) access, reduce permissions where possible, and monitor for unusual outbound requests from the WordPress server.

Similar Attacks

SSRF has been used in real-world incidents to reach internal services that were never intended to be exposed publicly. Examples include:

Shopify SSRF report (HackerOne) — a public disclosure showing how server-side requests can be abused to access internal resources.

GitLab SSRF report (HackerOne) — a real example of SSRF risk in a widely used platform.

Slack SSRF report (HackerOne) — demonstrates how SSRF can create unexpected access paths.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers