CVE-2026-5016
🟡 Monitoruj
Wykorzystanie podatności w elecV2 umożliwia zdalne ataki typu server-side request forgery.
CVSS
7.3
EPSS
0.1%
Exploit
none
Vendor
Opis źródłowy (NVD)
A vulnerability was identified in elecV2 elecV2P up to 3.8.3. This affects the function eAxios of the file /mock of the component URL Handler. Such manipulation of the argument req leads to server-side request forgery. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
ssrf
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.3 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-03-28 22:15:58 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-24 16:36:24 UTC |
Referencje
- https://github.com/elecV2/elecV2P/ (cna@vuldb.com)
- https://github.com/elecV2/elecV2P/issues/202 (cna@vuldb.com)
- https://vuldb.com/submit/779181 (cna@vuldb.com)
- https://vuldb.com/vuln/353901 (cna@vuldb.com)
- https://vuldb.com/vuln/353901/cti (cna@vuldb.com)