<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-44797 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-44797/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 15:32:20 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-44797/feed.xml" rel="self" type="application/rss+xml"/><item><title>Nautobot Webhook SSRF Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-nautobot-ssrf/</link><pubDate>Wed, 13 May 2026 15:32:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-nautobot-ssrf/</guid><description>Nautobot's Webhook feature is vulnerable to server-side request forgery (SSRF), allowing users with `add` or `change` permissions to make requests to unauthorized hosts, which is fixed in versions 2.4.33 and 3.1.2 by introducing settings to restrict webhook functionality.</description><content:encoded><![CDATA[<p>Nautobot&rsquo;s <code>Webhook</code> data model is susceptible to server-side request forgery (SSRF) due to insufficient restrictions on webhook destinations. This vulnerability allows users with the ability to create or modify <code>Webhook</code> records to potentially initiate requests to internal or otherwise restricted hosts and IP addresses. This can lead to information disclosure, internal network scanning, or exploitation of other internal services. The vulnerability affects Nautobot versions prior to 2.4.33 and versions between 3.0.0a2 and 3.1.2. Patches were released on May 13, 2026, in Nautobot v2.4.33 and v3.1.2 to address this issue. New settings <code>WEBHOOK_ALLOWED_SCHEMES</code>, <code>WEBHOOK_ADDITIONAL_BLOCKED_NETWORKS</code>, and <code>WEBHOOK_ALLOWED_HOSTS</code> are introduced to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a Nautobot account with permissions to manage Webhook objects (add or change).</li>
<li>The attacker creates a new Webhook or modifies an existing one.</li>
<li>The attacker configures the Webhook to send requests to an internal or restricted IP address or hostname. This could be an internal service, a local network address, or a blocked external host.</li>
<li>A triggering event occurs within Nautobot that activates the Webhook (e.g., device creation, change of status).</li>
<li>Nautobot&rsquo;s Webhook functionality initiates an HTTP/HTTPS request to the attacker-specified destination.</li>
<li>The target host receives the request originating from the Nautobot server.</li>
<li>The attacker observes the response from the target host or uses the SSRF to interact with internal services.</li>
<li>The attacker leverages the SSRF to potentially gather sensitive information, bypass access controls, or exploit vulnerable internal services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability can lead to the exposure of internal network infrastructure, sensitive data residing on internal services, or the ability to pivot to other internal systems. The impact depends on the accessibility and vulnerabilities of the targeted internal services. Without proper restrictions, attackers could potentially compromise the entire Nautobot server and the network it resides on.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Nautobot version 2.4.33 or 3.1.2 or later to apply the patches for CVE-2026-44797.</li>
<li>Review user permissions and restrict <code>add</code> and <code>change</code> permissions for the <code>Webhook</code> data model to only trusted administrators.</li>
<li>Audit existing <code>Webhook</code> records for suspicious or unauthorized destination URLs and IP addresses as recommended in the advisory.</li>
<li>Configure the <code>WEBHOOK_ALLOWED_SCHEMES</code> setting to restrict Webhooks to only HTTP and HTTPS protocols.</li>
<li>Utilize the <code>WEBHOOK_ADDITIONAL_BLOCKED_NETWORKS</code> setting to block access to internal networks (e.g., RFC1918 addresses) or other prohibited IP ranges.</li>
<li>If necessary, use the <code>WEBHOOK_ALLOWED_HOSTS</code> setting to explicitly allow access to specific hosts that are otherwise blocked by <code>WEBHOOK_ADDITIONAL_BLOCKED_NETWORKS</code>.</li>
<li>Deploy the Sigma rule to detect potentially malicious Webhook configurations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>nautobot</category><category>cve-2026-44797</category></item></channel></rss>