CVE-2026-41461
🟡 Monitoruj
Podatność w SocialEngine umożliwia atakującym zdalne wysyłanie żądań HTTP do wewnętrznych adresów.
CVSS
8.5
EPSS
0.0%
Exploit
none
Vendor
socialengine
Opis źródłowy (NVD)
SocialEngine versions 7.8.0 and prior contain a blind server-side request forgery vulnerability in the /core/link/preview endpoint where user-supplied input passed via the uri request parameter is not sanitized before being used to construct outbound HTTP requests. Authenticated remote attackers can supply arbitrary URLs including internal network addresses and loopback addresses to cause the server to issue HTTP requests to attacker-controlled destinations, enabling internal network enumeration and access to services not intended to be externally reachable.
ssrf
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.5 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.0% |
| Opublikowano (NVD) | 2026-04-23 15:37:24 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-29 20:16:30 UTC |
Referencje
- https://karmainsecurity.com/KIS-2026-07 (disclosure@vulncheck.com) [Third Party Advisory]
- https://socialengine.com (disclosure@vulncheck.com) [Product]
- https://www.vulncheck.com/advisories/socialengine-blind-ssrf-via-core-link-preview (disclosure@vulncheck.com) [Third Party Advisory]
- http://seclists.org/fulldisclosure/2026/Apr/11 (af854a3a-2127-422b-91ae-364da2661108)