Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-10705

Summary
Assigner-Wordfence
Assigner Org ID-b15e7b5b-3da4-40ae-a43c-f7aa60e62599
Published At-23 Oct, 2025 | 12:32
Updated At-08 Apr, 2026 | 17:21
Rejected At-
Credits

MxChat – AI Chatbot for WordPress <= 2.4.6 - Unauthenticated Blind Server-Side Request Forgery

The MxChat – AI Chatbot for WordPress plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 2.4.6. This is due to insufficient validation of user-supplied URLs in the PDF processing functionality. This makes it possible for unauthenticated attackers to make the WordPress server perform HTTP requests to arbitrary destinations via the mxchat_handle_chat_request AJAX action.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Wordfence
Assigner Org ID:b15e7b5b-3da4-40ae-a43c-f7aa60e62599
Published At:23 Oct, 2025 | 12:32
Updated At:08 Apr, 2026 | 17:21
Rejected At:
▼CVE Numbering Authority (CNA)
MxChat – AI Chatbot for WordPress <= 2.4.6 - Unauthenticated Blind Server-Side Request Forgery

The MxChat – AI Chatbot for WordPress plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 2.4.6. This is due to insufficient validation of user-supplied URLs in the PDF processing functionality. This makes it possible for unauthenticated attackers to make the WordPress server perform HTTP requests to arbitrary destinations via the mxchat_handle_chat_request AJAX action.

Affected Products
Vendor
mxchat
Product
MxChat – AI Chatbot & Content Generation for WordPress
Default Status
unaffected
Versions
Affected
  • From 0 through 2.4.6 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-918CWE-918 Server-Side Request Forgery (SSRF)
Type: CWE
CWE ID: CWE-918
Description: CWE-918 Server-Side Request Forgery (SSRF)
Metrics
VersionBase scoreBase severityVector
3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Jonas Benjamin Friedli
Timeline
EventDate
Vendor Notified2025-10-03 13:48:20
Disclosed2025-10-22 00:00:00
Event: Vendor Notified
Date: 2025-10-03 13:48:20
Event: Disclosed
Date: 2025-10-22 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.wordfence.com/threat-intel/vulnerabilities/id/c6ca63b8-b437-4e34-a57e-c3d956fbd102?source=cve
N/A
https://plugins.trac.wordpress.org/browser/mxchat-basic/tags/2.4.1/includes/class-mxchat-integrator.php#L1090
N/A
https://plugins.trac.wordpress.org/browser/mxchat-basic/tags/2.4.1/includes/class-mxchat-integrator.php#L1108
N/A
https://plugins.trac.wordpress.org/browser/mxchat-basic/tags/2.4.1/includes/class-mxchat-integrator.php#L2360
N/A
https://plugins.trac.wordpress.org/changeset/3378505/
N/A
Hyperlink: https://www.wordfence.com/threat-intel/vulnerabilities/id/c6ca63b8-b437-4e34-a57e-c3d956fbd102?source=cve
Resource: N/A
Hyperlink: https://plugins.trac.wordpress.org/browser/mxchat-basic/tags/2.4.1/includes/class-mxchat-integrator.php#L1090
Resource: N/A
Hyperlink: https://plugins.trac.wordpress.org/browser/mxchat-basic/tags/2.4.1/includes/class-mxchat-integrator.php#L1108
Resource: N/A
Hyperlink: https://plugins.trac.wordpress.org/browser/mxchat-basic/tags/2.4.1/includes/class-mxchat-integrator.php#L2360
Resource: N/A
Hyperlink: https://plugins.trac.wordpress.org/changeset/3378505/
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@wordfence.com
Published At:23 Oct, 2025 | 13:15
Updated At:27 Oct, 2025 | 13:20

The MxChat – AI Chatbot for WordPress plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 2.4.6. This is due to insufficient validation of user-supplied URLs in the PDF processing functionality. This makes it possible for unauthenticated attackers to make the WordPress server perform HTTP requests to arbitrary destinations via the mxchat_handle_chat_request AJAX action.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Type: Primary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-918Primarysecurity@wordfence.com
CWE ID: CWE-918
Type: Primary
Source: security@wordfence.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://plugins.trac.wordpress.org/browser/mxchat-basic/tags/2.4.1/includes/class-mxchat-integrator.php#L1090security@wordfence.com
N/A
https://plugins.trac.wordpress.org/browser/mxchat-basic/tags/2.4.1/includes/class-mxchat-integrator.php#L1108security@wordfence.com
N/A
https://plugins.trac.wordpress.org/browser/mxchat-basic/tags/2.4.1/includes/class-mxchat-integrator.php#L2360security@wordfence.com
N/A
https://plugins.trac.wordpress.org/changeset/3378505/security@wordfence.com
N/A
https://www.wordfence.com/threat-intel/vulnerabilities/id/c6ca63b8-b437-4e34-a57e-c3d956fbd102?source=cvesecurity@wordfence.com
N/A
Hyperlink: https://plugins.trac.wordpress.org/browser/mxchat-basic/tags/2.4.1/includes/class-mxchat-integrator.php#L1090
Source: security@wordfence.com
Resource: N/A
Hyperlink: https://plugins.trac.wordpress.org/browser/mxchat-basic/tags/2.4.1/includes/class-mxchat-integrator.php#L1108
Source: security@wordfence.com
Resource: N/A
Hyperlink: https://plugins.trac.wordpress.org/browser/mxchat-basic/tags/2.4.1/includes/class-mxchat-integrator.php#L2360
Source: security@wordfence.com
Resource: N/A
Hyperlink: https://plugins.trac.wordpress.org/changeset/3378505/
Source: security@wordfence.com
Resource: N/A
Hyperlink: https://www.wordfence.com/threat-intel/vulnerabilities/id/c6ca63b8-b437-4e34-a57e-c3d956fbd102?source=cve
Source: security@wordfence.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

116Records found

CVE-2025-12585
Matching Score-8
Assigner-Wordfence
ShareView Details
Matching Score-8
Assigner-Wordfence
CVSS Score-5.3||MEDIUM
EPSS-0.05% / 15.13%
||
7 Day CHG-0.03%
Published-03 Dec, 2025 | 03:27
Updated-22 Apr, 2026 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MxChat – AI Chatbot for WordPress <= 2.5.5 - Unauthenticated Information Exposure

The MxChat – AI Chatbot for WordPress plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.5.5 via upload filenames. This makes it possible for unauthenticated attackers to extract session values that can subsequently be used to access conversation data.

Action-Not Available
Vendor-mxchat
Product-MxChat – AI Chatbot & Content Generation for WordPress
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-46830
Matching Score-4
Assigner-JetBrains s.r.o.
ShareView Details
Matching Score-4
Assigner-JetBrains s.r.o.
CVSS Score-4.1||MEDIUM
EPSS-0.00% / 0.19%
||
7 Day CHG~0.00%
Published-08 Dec, 2022 | 17:38
Updated-23 Apr, 2025 | 14:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In JetBrains TeamCity between 2022.10 and 2022.10.1 a custom STS endpoint allowed internal port scanning.

Action-Not Available
Vendor-JetBrains s.r.o.
Product-teamcityTeamCity
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-45027
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.20% / 42.03%
||
7 Day CHG~0.00%
Published-01 Jan, 2023 | 00:00
Updated-11 Apr, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

perfSONAR before 4.4.6, when performing participant discovery, incorrectly uses an HTTP request header value to determine a local address.

Action-Not Available
Vendor-perfsonarn/a
Product-perfsonarn/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-4201
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-3.5||LOW
EPSS-0.10% / 27.84%
||
7 Day CHG~0.00%
Published-27 Jan, 2023 | 00:00
Updated-27 Mar, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A blind SSRF in GitLab CE/EE affecting all from 11.3 prior to 15.4.6, 15.5 prior to 15.5.5, and 15.6 prior to 15.6.1 allows an attacker to connect to local addresses when configuring a malicious GitLab Runner.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-38398
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-5.3||MEDIUM
EPSS-0.22% / 44.99%
||
7 Day CHG~0.00%
Published-22 Sep, 2022 | 00:00
Updated-03 Nov, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Server-Side Request Forgery Information Disclosure Vulnerability

Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to load a url thru the jar protocol. This issue affects Apache XML Graphics Batik 1.14.

Action-Not Available
Vendor-Debian GNU/LinuxThe Apache Software Foundation
Product-debian_linuxbatikApache XML Graphics
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-39211
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-3||LOW
EPSS-0.23% / 45.82%
||
7 Day CHG~0.00%
Published-16 Sep, 2022 | 23:10
Updated-23 Apr, 2025 | 16:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Server-Side Request Forgery (SSRF) via potential filter bypass in Nextcloud Server

Nextcloud server is an open source personal cloud platform. In affected versions it was found that locally running webservices can be found and requested erroneously. It is recommended that the Nextcloud Server is upgraded to 23.0.8 or 24.0.4. It is recommended that the Nextcloud Enterprise Server is upgraded to 22.2.10.4, 23.0.8 or 24.0.4. There are no known workarounds for this issue.

Action-Not Available
Vendor-Nextcloud GmbH
Product-nextcloud_enterprise_servernextcloud_serversecurity-advisories
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-39276
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-3.5||LOW
EPSS-0.18% / 39.74%
||
7 Day CHG~0.00%
Published-03 Nov, 2022 | 00:00
Updated-22 Apr, 2025 | 16:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Blind Server-Side Request Forgery (SSRF) in RSS feeds and planning

GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Usage of RSS feeds or an external calendar in planning is subject to SSRF exploit. In case a remote script returns a redirect response, the redirect target URL is not checked against the URL allow list defined by administrator. This issue has been patched, please upgrade to 10.0.4. There are currently no known workarounds.

Action-Not Available
Vendor-GLPI Project
Product-glpiglpi
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-39055
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-5.3||MEDIUM
EPSS-0.09% / 25.38%
||
7 Day CHG~0.00%
Published-18 Oct, 2022 | 05:40
Updated-09 May, 2025 | 14:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Changing Information Technology Inc. RAVA certificate validation system - Server-Side Request Forgery (SSRF)

RAVA certificate validation system has inadequate filtering for URL parameter. An unauthenticated remote attacker can perform SSRF attack to discover internal network topology base on query response.

Action-Not Available
Vendor-changingtecChanging Information Technology Inc.
Product-rava_certificate_validation_systemRAVA certificate validation system
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2025-15104
Matching Score-4
Assigner-Fluid Attacks
ShareView Details
Matching Score-4
Assigner-Fluid Attacks
CVSS Score-6.9||MEDIUM
EPSS-0.03% / 7.25%
||
7 Day CHG~0.00%
Published-16 Jan, 2026 | 14:00
Updated-23 Jan, 2026 | 16:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Nu Html Checker (validator.nu) - Restriction bypass vulnerability allowing local SSRF

Nu Html Checker (validator.nu) contains a restriction bypass that allows remote attackers to make the server perform arbitrary HTTP/HTTPS requests to internal resources, including localhost services. While the validator implements hostname-based protections to block direct access to localhost and 127.0.0.1, these controls can be bypassed using DNS rebinding techniques or domains that resolve to loopback addresses.This issue affects The Nu Html Checker (vnu): latest (commit 23f090a11bab8d0d4e698f1ffc197a4fe226a9cd).

Action-Not Available
Vendor-validatorThe Nu Html Checker
Product-validatorThe Nu Html Checker
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2026-40100
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 17.29%
||
7 Day CHG-0.02%
Published-10 Apr, 2026 | 16:39
Updated-15 Apr, 2026 | 19:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FastGPT has Unauthenticated SSRF in /api/core/app/mcpTools/runTool via missing CHECK_INTERNAL_IP default

FastGPT is an AI Agent building platform. Prior to 4.14.10.3, the /api/core/app/mcpTools/runTool endpoint accepts arbitrary URLs without authentication. The internal IP check in isInternalAddress() only blocks private IPs when CHECK_INTERNAL_IP=true, which is not the default. This allows unauthenticated attackers to perform SSRF against internal network resources. This vulnerability is fixed in 4.14.10.3.

Action-Not Available
Vendor-fastgptLabring Computing Co., LTD.
Product-fastgptFastGPT
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2026-34443
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.9||MEDIUM
EPSS-0.04% / 11.86%
||
7 Day CHG~0.00%
Published-31 Mar, 2026 | 21:28
Updated-13 Apr, 2026 | 15:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FreeScout: SSRF protection bypass via broken CIDR check in checkIpByMask()

FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Prior to version 1.8.211, checkIpByMask() in app/Misc/Helper.php checks whether the input IP contains a / character. Plain IP addresses never contain /, so the function always returns false without checking any CIDR ranges. The entire 10.0.0.0/8 and 172.16.0.0/12 private ranges are unprotected. This issue has been patched in version 1.8.211.

Action-Not Available
Vendor-freescoutfreescout-help-desk
Product-freescoutfreescout
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2026-31804
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4||MEDIUM
EPSS-0.06% / 16.89%
||
7 Day CHG~0.00%
Published-30 Mar, 2026 | 19:42
Updated-14 Apr, 2026 | 01:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tautulli: Unauthenticated pms_image_proxy endpoint proxies arbitrary HTTP requests through the Plex Media Server

Tautulli is a Python based monitoring and tracking tool for Plex Media Server. Prior to version 2.17.0, the /pms_image_proxy endpoint accepts a user-supplied img parameter and forwards it to Plex Media Server's /photo/:/ transcode transcoder without authentication and without restricting the scheme or host. The endpoint is intentionally excluded from all authentication checks in webstart.py, any value of img beginning with http is passed directly to Plex, this causes the Plex Media Server process, which typically runs on the same host or internal network as Tautulli, with access to RFC-1918 address space, to issue an outbound HTTP request to any attacker-specified URL. This issue has been patched in version 2.17.0.

Action-Not Available
Vendor-tautulliTautulli
Product-tautulliTautulli
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2026-32019
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-2.3||LOW
EPSS-0.04% / 12.78%
||
7 Day CHG~0.00%
Published-19 Mar, 2026 | 22:06
Updated-20 Apr, 2026 | 13:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenClaw < 2026.2.22 - Incomplete IPv4 Special-Use Range Blocking in SSRF Guard

OpenClaw versions prior to 2026.2.22 contain incomplete IPv4 special-use range validation in the isPrivateIpv4() function, allowing requests to RFC-reserved ranges to bypass SSRF policy checks. Attackers with network reachability to special-use IPv4 ranges can exploit web_fetch functionality to access blocked addresses such as 198.18.0.0/15 and other non-global ranges.

Action-Not Available
Vendor-OpenClaw
Product-openclawOpenClaw
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2026-32111
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 11.91%
||
7 Day CHG~0.00%
Published-11 Mar, 2026 | 20:41
Updated-17 Mar, 2026 | 15:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ha-mcp OAuth 2.1 DCR mode enables network reconnaissance via an error oracle

ha-mcp is a Home Assistant MCP Server. Prior to 7.0.0, the ha-mcp OAuth consent form (beta feature) accepts a user-supplied ha_url and makes a server-side HTTP request to {ha_url}/api/config with no URL validation. An unauthenticated attacker can submit arbitrary URLs to perform internal network reconnaissance via an error oracle. Two additional code paths in OAuth tool calls (REST and WebSocket) are affected by the same primitive. The primary deployment method (private URL with pre-configured HOMEASSISTANT_TOKEN) is not affected. This vulnerability is fixed in 7.0.0.

Action-Not Available
Vendor-homeassistant-aihomeassistant-ai
Product-home_assistant_mcp_serverha-mcp
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-32457
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-5.3||MEDIUM
EPSS-0.55% / 68.14%
||
7 Day CHG~0.00%
Published-20 Jul, 2022 | 02:01
Updated-16 Sep, 2024 | 22:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Data Systems Consulting Co., Ltd. BPM - Blind Server-Side Request Forgery (SSRF)

Digiwin BPM has inadequate filtering for URL parameter. An unauthenticated remote attacker can perform Blind SSRF attack to discover internal network topology base on URL error response.

Action-Not Available
Vendor-digiwinData Systems Consulting Co., Ltd.
Product-business_process_managementBPM
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2023-48379
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-5.3||MEDIUM
EPSS-0.27% / 50.23%
||
7 Day CHG~0.00%
Published-15 Dec, 2023 | 08:05
Updated-02 Aug, 2024 | 21:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Softnext Mail SQR Expert - Blind Server-Side Request Forgey (SSRF)

Softnext Mail SQR Expert is an email management platform, it has inadequate filtering for a specific URL parameter within a specific function. An unauthenticated remote attacker can perform Blind SSRF attack to discover internal network topology base on URL error response.

Action-Not Available
Vendor-softnextSoftnext
Product-mail_sqr_expertMail SQR Expert
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2025-13789
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.03% / 9.66%
||
7 Day CHG~0.00%
Published-30 Nov, 2025 | 13:32
Updated-04 Dec, 2025 | 16:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ZenTao model.php makeRequest server-side request forgery

A vulnerability was found in ZenTao up to 21.7.6-8564. This affects the function makeRequest of the file module/ai/model.php. The manipulation of the argument Base results in server-side request forgery. The attack can be launched remotely. The exploit has been made public and could be used. Upgrading to version 21.7.6 mitigates this issue. It is suggested to upgrade the affected component.

Action-Not Available
Vendor-zentaon/a
Product-zentaoZenTao
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2020-6308
Matching Score-4
Assigner-SAP SE
ShareView Details
Matching Score-4
Assigner-SAP SE
CVSS Score-5.3||MEDIUM
EPSS-82.06% / 99.22%
||
7 Day CHG~0.00%
Published-20 Oct, 2020 | 13:31
Updated-04 Aug, 2024 | 08:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SAP BusinessObjects Business Intelligence Platform (Web Services) versions - 410, 420, 430, allows an unauthenticated attacker to inject arbitrary values as CMS parameters to perform lookups on the internal network which is otherwise not accessible externally. On successful exploitation, attacker can scan internal network to determine internal infrastructure and gather information for further attacks like remote file inclusion, retrieve server files, bypass firewall and force the vulnerable server to perform malicious requests, resulting in a Server-Side Request Forgery vulnerability.

Action-Not Available
Vendor-SAP SE
Product-businessobjects_business_intelligence_platformSAP BusinessObjects Business Intelligence Platform (Web Services)
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-29188
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.26% / 49.76%
||
7 Day CHG~0.00%
Published-20 May, 2022 | 23:50
Updated-23 Apr, 2025 | 18:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Smokescreen SSRF via deny list bypass (square brackets) in Smokescreen

Smokescreen is an HTTP proxy. The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure. Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny list. There was an issue in Smokescreen that made it possible to bypass the deny list feature by surrounding the hostname with square brackets (e.g. `[example.com]`). This only impacted the HTTP proxy functionality of Smokescreen. HTTPS requests were not impacted. Smokescreen version 0.0.4 contains a patch for this issue.

Action-Not Available
Vendor-stripestripe
Product-smokescreensmokescreen
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2025-1220
Matching Score-4
Assigner-PHP Group
ShareView Details
Matching Score-4
Assigner-PHP Group
CVSS Score-3.7||LOW
EPSS-0.06% / 17.00%
||
7 Day CHG~0.00%
Published-13 Jul, 2025 | 22:18
Updated-04 Nov, 2025 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Null byte termination in hostnames

In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* before 8.4.10 some functions like fsockopen() lack validation that the hostname supplied does not contain null characters. This may lead to other functions like parse_url() treat the hostname in different way, thus opening way to security problems if the user code implements access checks before access using such functions.

Action-Not Available
Vendor-The PHP Group
Product-phpPHP
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2023-45822
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-3.7||LOW
EPSS-0.09% / 25.42%
||
7 Day CHG~0.00%
Published-19 Oct, 2023 | 20:53
Updated-12 Sep, 2024 | 17:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unsafe rego built-in allowed in Artifact Hub

Artifact Hub is a web-based application that enables finding, installing, and publishing packages and configurations for CNCF projects. During a security audit of Artifact Hub's code base a security researcher identified a bug in which a default unsafe rego built-in was allowed to be used when defining authorization policies. Artifact Hub includes a fine-grained authorization mechanism that allows organizations to define what actions can be performed by their members. It is based on customizable authorization policies that are enforced by the `Open Policy Agent`. Policies are written using `rego` and their data files are expected to be json documents. By default, `rego` allows policies to make HTTP requests, which can be abused to send requests to internal resources and forward the responses to an external entity. In the context of Artifact Hub, this capability should have been disabled. This issue has been resolved in version `1.16.0`. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-artifacthubartifacthub
Product-hubhub
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-24825
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.21% / 42.43%
||
7 Day CHG~0.00%
Published-19 Apr, 2022 | 19:45
Updated-23 Apr, 2025 | 18:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Smokescreen SSRF via deny list bypass

Smokescreen is a simple HTTP proxy that fogs over naughty URLs. The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure. Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny list. There was an issue in Smokescreen that made it possible to bypass the deny list feature by appending a dot to the end of user-supplied URLs, or by providing input in a different letter case. Recommended to upgrade Smokescreen to version 0.0.3 or later.

Action-Not Available
Vendor-stripestripe
Product-smokescreensmokescreen
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2025-0584
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-5.3||MEDIUM
EPSS-0.02% / 5.77%
||
7 Day CHG~0.00%
Published-20 Jan, 2025 | 02:06
Updated-17 Nov, 2025 | 19:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
aEnrich Technology a+HRD - Server-Side Request Forgery (SSRF)

The a+HRD from aEnrich Technology has a Server-side Request Forgery, allowing unauthenticated remote attackers to exploit this vulnerability to probe internal network.

Action-Not Available
Vendor-Yukai Digital Technology (aEnrich)
Product-a\+hrda+HRD
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-6538
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.17% / 38.31%
||
7 Day CHG~0.00%
Published-25 Nov, 2024 | 06:15
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Openshift-console: openshift console: server-side request forgery

A flaw was found in OpenShift Console. A Server Side Request Forgery (SSRF) attack can happen if an attacker supplies all or part of a URL to the server to query. The server is considered to be in a privileged network position and can often reach exposed services that aren't readily available to clients due to network filtering. Leveraging such an attack vector, the attacker can have an impact on other services and potentially disclose information or have other nefarious effects on the system. The /api/dev-console/proxy/internet endpoint on the OpenShift Console allows authenticated users to have the console's pod perform arbitrary and fully controlled HTTP(s) requests. The full response to these requests is returned by the endpoint. While the name of this endpoint suggests the requests are only bound to the internet, no such checks are in place. An authenticated user can therefore ask the console to perform arbitrary HTTP requests from outside the cluster to a service inside the cluster.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat OpenShift Container Platform 4.14Red Hat OpenShift Container Platform 4.16Red Hat OpenShift Container Platform 4.17Red Hat OpenShift Container Platform 4.15Red Hat OpenShift Container Platform 4.18
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-1188
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-3.7||LOW
EPSS-0.33% / 55.42%
||
7 Day CHG~0.00%
Published-04 Apr, 2022 | 19:46
Updated-02 Aug, 2024 | 23:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.1 before 14.7.7, all versions starting from 14.8 before 14.8.5, all versions starting from 14.9 before 14.9.2 where a blind SSRF attack through the repository mirroring feature was possible.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-0508
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-6.5||MEDIUM
EPSS-0.21% / 43.63%
||
7 Day CHG~0.00%
Published-08 Feb, 2022 | 10:30
Updated-02 Aug, 2024 | 23:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Server-Side Request Forgery (SSRF) in chocobozzz/peertube

Server-Side Request Forgery (SSRF) in GitHub repository chocobozzz/peertube prior to f33e515991a32885622b217bf2ed1d1b0d9d6832

Action-Not Available
Vendor-framasoftchocobozzz
Product-peertubechocobozzz/peertube
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-0870
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-5||MEDIUM
EPSS-9.12% / 92.70%
||
7 Day CHG+3.90%
Published-11 Mar, 2022 | 10:40
Updated-02 Aug, 2024 | 23:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Server-Side Request Forgery (SSRF) in gogs/gogs

Server-Side Request Forgery (SSRF) in GitHub repository gogs/gogs prior to 0.12.5.

Action-Not Available
Vendor-gogsgogs
Product-gogsgogs/gogs
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-51980
Matching Score-4
Assigner-Rapid7, Inc.
ShareView Details
Matching Score-4
Assigner-Rapid7, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.63% / 70.43%
||
7 Day CHG~0.00%
Published-25 Jun, 2025 | 07:22
Updated-07 Apr, 2026 | 05:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated Server Side Request Forgery (SSRF) via WS-Addressing affecting multiple models from Brother Industries, Ltd, FUJIFILM Business Innovation, Ricoh, Toshiba Tec, and Konica Minolta, Inc.

An unauthenticated attacker may perform a limited server side request forgery (SSRF), forcing the target device to open a TCP connection to an arbitrary port number on an arbitrary IP address. This SSRF leverages the WS-Addressing ReplyTo element in a Web service (HTTP TCP port 80) SOAP request. The attacker can not control the data sent in the SSRF connection, nor can the attacker receive any data back. This SSRF is suitable for TCP port scanning of an internal network when the Web service (HTTP TCP port 80) is exposed across a network segment.

Action-Not Available
Vendor-Brother Industries, LtdKonica Minolta, Inc.FUJIFILM Business InnovationToshiba TecRicoh Company, Ltd.
Product-HL-L5212DNDocuPrint P225 dHL-L5200DWHL-L5200DWTMFC-L3720CDWDCP-L2550DW (Japan)MFC-L3780CDWHL-L5210DWTMFC-J4535DW(XL)MFC-J4340DWEHL-B2080DWMFC-L2860DWEDCP-L3520CDWDCP-J914NMFC-L5800DWDCP-L2530DWMFC-L6950DWDCP-7189DWDocuPrint M118 zHL-B2100DBe-STUDIO302DNFHL-B2180DWMFC-J1010DWHL-L5215DNHL-L5210DNDCP-L5510DNDCP-J973N W/BMFC-L2751DWbizhub 4000iMFC-J6995CDWRJ-2150DCP-J928N-W/BDCP-L2550DW (Taiwan)MFC-J5340DWEDCP-B7530DNMFC-L6902DWMFC-L3755CDWMFC-J2340DWDCP-J4143NHL-L6300DWDCP-C1210NMFC-L2900DWDCP-1610WEDCP-1623WEDCP-L2537DWMFC-L2860DW (Japan)MFC-L3780CDW (Japan)DCP-1618WDCP-L2600DWMFC-1910WEHL-L1232WDCP-L2605DWMFC-L6915DWHL-B2158WDCP-L2540DW (Japan)DCP-1615NWMFC-J5345DWDocuPrint M288 zbizhub 3080MFMFC-L2740DWRRJ-3250WBDCP-T226MFC-J738DNTD-4420DNDocuPrint M268 dwHL-2560DNDCP-L2647DWDCP-L2625DWDCP-B7650DWMFC-J6555DWMFC-L2730DWRMFC-J904NMFC-T810W(China)MFC-1916NWSP 230DNwDCP-B7628DWHL-L2385DWHL-L2365DWRMFC-J738DWNRJ-2140MFC-L2880DWHL-L3270CDWMFC-L2820DWXLHL-L6400DWGDCP-L1632WDocuPrint M115 wMFC-L2760DWHL-L1230WHL-5595DNDCP-T835DWDCP-J973N-W/BHL-1210WEMFC-EX915DWMFC-L5710DWMFC-EX670WDCP-L2550DNRHL-L5218DNMFC-L3770CDWMFC-L2700DWDCP-T725DWDCP-J1700DWDCP-L2531DWMFC-J1300DWMFC-L2765DWDocuPrint P275 dwDCP-L2530DWRMFC-L8610CDW (Japan)DocuPrint M235 dwHL-L2370DNRMFC-L2880DW (Japan)MFC-J6947DWHL-L9410CDNMFC-L2862DWMFC-L6910DNDCP-B7608WDCP-B7640DWDCP-T820DWSP-1 (Japan)DCP-L1638WMFC-L2750DW (Japan)MFC-L9577CDWDCP-T436WHL-L2460DWXLDCP-L2535DWMFC-L5750DWDCP-B7620DWMFC-L2707DWM 340WApeos 4620 SXMFC-J6955DWDCP-B7640DW (Asia)HL-L6410DNMFC-L2802DWMFC-J7700CDWDocuPrint M285 zDCP-L2560DWRDCP-1612WEDCP-J988NApeosPrint 4620 SDN (For China)DocuPrint M260 zDCP-L5660DNMFC-L6750DWHL-L5212DWPJ-773DCP-B7600DMFC-L2701DWDCP-L1848WDocuPrint M225 dwMFC-L3760CDWDCP-J1100DWADS-3000Nbizhub 3000MFHL-L1238WPJ-883MFC-J805DWXLDocuPrint M225 zHL-L6210DWTDCP-B7535DW (China)DCP-B7600DBMFC-J815DWXLDocuPrint P235 dDCP-L2660DW (Japan)HL-L2380DWDCP-J1200W(XL)DCP-7190DWDCP-L2552DNDCP-L2520DWHL-J6000DWDCP-1612WMFC-J6999CDWHL-1223WRMFC-L5715DWMFC-1910WMFC-L9670CDNDCP-T426WHL-B2050DNMFC-J497DWDCP-B7520DWMFC-J7600CDWHL-L6310DWMFC-L2717DWDCP-L2627DWRJ-4250WBDCP-L2540DNDCP-J772DWMFC-L3750CDWHL-3190CDWHL-L5202DWDocuPrint M118 wMFC-J1170DWMFC-L3768CDWHL-L2425DWDocuPrint P115 wDocuPrint M375 dfMFC-L9570CDW (Japan)DocuPrint M265 zMFC-T930DWDCP-J978N-W/BPT-P950NWMFC-J898NDCP-J1140DWHL-1212WDCP-1610WDCP-T236MFC-L5915DWMFC-L6702DWHL-JF1HL-L5050DNMFC-L2730DNHL-L2440DWHL-L2460DWDCP-T220HL-T4000DWDocuPrint P268 dwDCP-L2550DNApeos 4620 SDFMFC-L5900DWMFC-L2710DWMFC-J6530DWMFC-L2885DWHL-B2150WDCP-L2541DWHL-L2460DNHL-L2351DWMFC-L2710DNRDCP-L2648DWMFC-1915WDCP-T439WDCP-J582NDCP-T720DWHL-2595DWMFC-L6912DWMFC-L2720DWFAX-L2800DWMFC-J6957DWMFC-L2800DWMFC-7895DWDocuPrint M378 dDCP-J526NMFC-B7811DWPT-P900WMFC-T810WMFC-L2712DWDCP-J1203NDCP-L2540DWMFC-L3745CDWTD-2350DMFC-J926N-WBMFC-L2807DWHL-L2350DWRDCP-L2508DWMFC-L3765CDWMFC-B7800DNMFC-L2720DNDCP-T735DWDCP-L2551DWHL-L6402DWMFC-L5912DWMFC-L6710DWHL-L2464DWMFC-L2750DWRMFC-L5755DW (Japan)MFC-L2732DWTD-4550DNWBMFC-T925DWDCP-L5610DNMFC-L6700DWMFC-L9610CDNHL-L2420DWHL-J7010CDWHL-EX470WHL-L2445DWMFC-L8610CDWDCP-L2520DWRHL-1210WRMFC-J6540DWEMFC-L2710DNMFC-L2740DWMFC-L2820DWDCP-L3550CDWMFC-L2960DWDCP-T425WMFC-J6983CDWDCP-C421WTD-2135NWBSADocuPrint P378 dDCP-B7638DNSP 230SFNwDCP-J972NHL-L5102DWMFC-L2922DWHL-L5215DWDCP-L2600DDCP-L2532DWMFC-J1800DW (USA)MFC-J6945DWDocuPrint P288 dwMFC-L3770CDW (Japan)DCP-L3528CDWMFC-L2886DWMFC-J5730DWMFC-L2750DWXLDCP-L8410CDWHL-L2315DWDCP-L3515CDWMFC-J895DWHL-L5100DNTQL-820NWBDocuPrint P285 dwMFC-J6580CDWDCP-L2627DWXLHL-L8360CDWHL-L6202DWDCP-J982N W/BMFC-J2730DWHL-L2371DNMFC-J739DNMFC-8540DNHL-L8240CDWHL-EX415DWMFC-L6970DWDCP-B7558WMFC-L6900DWGHL-L2365DWHL-L2465DWHL-B2188DWMFC-J1605DNMFC-J5830DWHL-L2400DWEHL-1222WEMFC-L2806DWHL-L2340DWRMFC-J3540DWFAX-L2710DNDCP-B7648DWMFC-8530DNMFC-J5930DWHL-L2461DNDCP-T525WMFC-J6959DWADS-3600WHL-L6415DWMFC-J739DWNMFC-L9635CDNRJ-2050HL-L8360CDWTDCP-L2627DWEDocuPrint P268 dMFC-L2740DW (Japan)MFC-J7300CDWHL-L6210DWDCP-J587NMFC-J5800CDWMFC-L2861DWHL-L2467DWDCP-T230HL-L2447DWMFC-J5855DWHL-1210WMFC-J1012DWMFC-J491DWHL-3160CDWMFC-J6535DWMFC-J903NDCP-L5510DWHL-L2350DWDCP-J987N-W/BHL-L2480DWMFC-L2880DWXLHL-L3288CDWMFC-L2805DWHL-1223WEDocuPrint M275 zMFC-J1205W(XL)DCP-T825DWMFC-1911WDCP-T830DWMFC-L2900DWXLMFC-J7500CDWMFC-L3740CDWHL-L3228CDWHL-J6100DWDCP-9030CDNMFC-J6935DWDocuPrint M115 zDCP-J4543NMFC-L5700DWMFC-J5845DW(XL)HL-L6450DWHL-L5100DNDCP-J987N W/BMFC-1919NWHL-L2325DWHL-L2360DNDCP-L3551CDWDCP-T535DWHL-L3280CDWMFC-J890DWMFC-L5710DNHL-L9430CDNDCP-L6600DWHL-L5210DN (Japan)MFC-B7720DNMFC-L2720DWRMFC-L2750DWMFC-J6940DWDCP-L3520CDWEHL-L2370DNHL-L3230CDWDocuPrint M375 zDCP-L5600DNDCP-J982N-W/BDocuPrint M385 zDocuPrint M235 zDCP-J572DWMFC-EX910HL-1212WEMFC-J4335DW(XL)ADS-2800WMFC-L5700DNDCP-T710W(China)DCP-L5518DNMFC-L6820DWApeosPrint 4620 SDN (For Asia-Pacific)MFC-L3730CDNHL-L6300DWTMFC-J6930DWHL-L5210DWbizhub 4020iMFC-L5902DWDocuPrint P378 dwDCP-1612WRHL-L2360DWMFC-L2715DWHL-L2370DWDCP-L2660DWMFC-L2713DWHL-B2180DWBMFC-J3930DWMFC-J6555DWXLMFC-L6915DNMFC-B7715DWHL-L6250DNHL-L2305WMFC-T920DWMFC-J2330DWMFC-J939DNMFC-L3710CDWDCP-L2551DNMFC-L8900CDWDCP-1623WRTD-2135NWBHL-L3215CWMFC-J5630CDWMFC-L2920DWHL-L3290CDWMFC-L2827DWXLDCP-T710WQL-1115NWBDCP-L5650DNMFC-L5710DW (Japan)DCP-L5662DNMFC-J4440NDocuPrint P385 dwMFC-J7100CDWDCP-J4140NHL-L2370DWXLHL-L2372DNDCP-B7658DWDCP-L5502DNMFC-L2716DWMFC-J805DWMFC-L2690DWMFC-J6730DWDCP-7190DNMFC-L2980DWDCP-J774DWMFC-L8690CDWMFC-J1800DW (Europe)DocuPrint M288 dwDCP-J1200WEMFC-L6810DWMFC-L6720DWHL-2569DWMFC-L2700DWRMFC-J5335DWDocuPrint M378 dfDCP-L2620DWMFC-L2835DWMFC-9350CDWHL-L2865DWDCP-J915NMFC-T4500DWMFC-J4540NHL-L2340DWQL-820NWBcMFC-EX670MFC-7880DNDocuPrint P360 dwDCP-L5652DNDCP-J528NDCP-T225DCP-L5512DNDCP-T520WMFC-J3530DWDocuPrint M115 fwMFC-L5718DNDCP-L2622DWHL-L2395DWMFC-J995DWXLHL-L8260CDNHL-L9470CDNHL-L6400DWTDCP-7090DWHL-L2360DNRMFC-L6900DW (Japan)MFC-L2700DNHL-L2386DWHL-L6418DWDCP-L2640DWHL-L2400DWMFC-L5717DWHL-L3220CWMFC-L2700DW (Asia)DCP-B7548WHL-L6200DWMFC-L5728DWMFC-J690DWMFC-L2685DWHL-L5210DW (Japan)HL-L1808WHL-L8245CDWMFC-L5702DWHL-5590DNMFC-J998DWNHL-2590DNDCP-L2535DW (China)MFC-L6800DWDCP-L2640DNHL-L6250DWHL-L6415DNFAX-L2700DNPT-P750WMFC-J5855DWXLMFC-J4540DW(XL)RJ-3150MFC-J5330DWMFC-J3940DWMFC-L2705DWHL-L2375DWHL-L2352DWDocuPrint P118 wHL-1212WRMFC-J6583CDWDCP-L3568CDWMFC-7889DWMFC-L2827DWMFC-J4345DWXLP 201WDocuPrint P388 dwMFC-L2712DNMFC-L8340CDWDCP-T430WMFC-J6980CDWMFC-L2770DWMFC-L3740CDWETD-2135NDCP-J978N W/BMFC-J5340DWHL-L8260CDWHL-L3295CDWApeosPrint 4620 SDWDCP-T510WDCP-J572NMFC-L2715DW (Taiwan/Korea/Hong Kong)HL-L2376DWDCP-1617NWDCP-7180DNDocuPrint P375 dDCP-T536DWDCP-T510W(China)DCP-L3517CDWMFC-L5802DWDCP-L5500DNHL-L6217DWMFC-L2703DWDocuPrint M268 zMFC-J6740DWMFC-J1500NDCP-T530DWDocuPrint P260 dwDCP-B7578DWMFC-7890DNHL-L3240CDWM 340FWMFC-J6997CDWMFC-J893NTD-2320DTD-2350DSAMFC-J6540DWHL-J6000CDWDCP-T428WMFC-L2805DW (Asia)TD-2135NSAHL-L5228DWMFC-L9630CDNMFC-B7810DWHL-L6412DWHL-L8230CDWDCP-L5602DNDCP-T420WRJ-3050HL-L2357DWDCP-L2628DWDCP-L1630WDCP-B7520DW (China)DCP-1616NWMFC-T910DWMFC-J4443NMFC-L3735CDNMFC-J5955DWDCP-T730DWHL-J6010DWDCP-L2518DWMFC-L2817DWDCP-L3510CDWHL-L3220CWEDCP-B7620DWBHL-L2405WHL-L2390DWDCP-T238MFC-L6900DWDCP-L3560CDWDCP-7195DWHL-L6415DWTDocuPrint P375 dwMFC-T935DWHL-B2100DHL-L2366DWMFC-J998DNMFC-L2771DWHL-1218WHL-L2475DWHL-L2361DNMFC-L5850DWHL-L6310DW (Japan)DCP-L2550DWMFC-L2710DWRDCP-L2680DWHL-5595DNHMFC-L9570CDWDCP-J1200NMFC-J5945DWMFC-J1215WDCP-L2665DWHL-1211WMFC-1912WRMFC-J5740DWDCP-L2548DWMFC-B7810DWBMFC-J4340DW(XL)DCP-B7535DWHL-L3300CDWMFC-L8395CDWMFC-J939DWNHL-L9310CDWDCP-L3555CDWbizhub 5000iMFC-9150CDNMFC-L5715DNDCP-J981NADS-2400NDCP-L2550DW (China)DCP-J1050DWDCP-T435WDCP-1610WRDCP-L2540DNRe-STUDIO301DNHL-B2181DWDCP-L2560DWApeos 4620 SZDCP-J1800NDCP-J577NMFC-L8390CDWHL-L3230CDNHL-L6200DWTMFC-J4940DNMFC-L2680WHL-L3220CDWHL-L3210CWMFC-J2740DWTD-2320DSADocuPrint P265 dwDCP-1622WEMFC-L2802DNMFC-1911NWHL-L6400DWMFC-L2860DWSP-1MFC-L2730DWMFC-L5755DWHL-L2375DWRMFC-J995DWbizhub 5020iMFC-J905NDCP-B7640DWBMFC-J4440DW
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2026-21859
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.8||MEDIUM
EPSS-1.02% / 77.29%
||
7 Day CHG~0.00%
Published-07 Jan, 2026 | 23:24
Updated-02 Feb, 2026 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Mailpit Proxy Endpoint is Vulnerable to Server-Side Request Forgery (SSRF)

Mailpit is an email testing tool and API for developers. Versions 1.28.0 and below have a Server-Side Request Forgery (SSRF) vulnerability in the /proxy endpoint, allowing attackers to make requests to internal network resources. The /proxy endpoint validates http:// and https:// schemes, but it does not block internal IP addresses, enabling attackers to access internal services and APIs. This vulnerability is limited to HTTP GET requests with minimal headers. The issue is fixed in version 1.28.1.

Action-Not Available
Vendor-axllentaxllent
Product-mailpitmailpit
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-51981
Matching Score-4
Assigner-Rapid7, Inc.
ShareView Details
Matching Score-4
Assigner-Rapid7, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.78% / 73.68%
||
7 Day CHG~0.00%
Published-25 Jun, 2025 | 07:23
Updated-07 Apr, 2026 | 05:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated Server Side Request Forgery (SSRF) via WS-Eventing affecting multiple models from Brother Industries, Ltd, FUJIFILM Business Innovation, Ricoh, and Toshiba Tec, and Konica Minolta, Inc.

An unauthenticated attacker may perform a blind server side request forgery (SSRF), due to a CLRF injection issue that can be leveraged to perform HTTP request smuggling. This SSRF leverages the WS-Addressing feature used during a WS-Eventing subscription SOAP operation. The attacker can control all the HTTP data sent in the SSRF connection, but the attacker can not receive any data back from this connection.

Action-Not Available
Vendor-Brother Industries, LtdKonica Minolta, Inc.FUJIFILM Business InnovationToshiba TecRicoh Company, Ltd.
Product-HL-L5212DNDocuPrint P225 dHL-L5200DWHL-L5200DWTMFC-L3720CDWDCP-L2550DW (Japan)MFC-L3780CDWHL-L5210DWTMFC-J4535DW(XL)MFC-J4340DWEHL-B2080DWMFC-L2860DWEDCP-L3520CDWDCP-J914NMFC-L5800DWDCP-L2530DWMFC-L6950DWDCP-7189DWDocuPrint M118 zHL-B2100DBe-STUDIO302DNFHL-B2180DWMFC-J1010DWHL-L5215DNHL-L5210DNDCP-L5510DNDCP-J973N W/BMFC-L2751DWbizhub 4000iMFC-J6995CDWRJ-2150DCP-J928N-W/BDCP-L2550DW (Taiwan)MFC-J5340DWEDCP-B7530DNMFC-L6902DWMFC-L3755CDWMFC-J2340DWDCP-J4143NHL-L6300DWDCP-C1210NMFC-L2900DWDCP-1610WEDCP-1623WEDCP-L2537DWMFC-L2860DW (Japan)MFC-L3780CDW (Japan)DCP-1618WDCP-L2600DWMFC-1910WEHL-L1232WDCP-L2605DWMFC-L6915DWHL-B2158WDCP-L2540DW (Japan)DCP-1615NWMFC-J5345DWDocuPrint M288 zbizhub 3080MFMFC-L2740DWRRJ-3250WBDCP-T226MFC-J738DNTD-4420DNDocuPrint M268 dwHL-2560DNDCP-L2647DWDCP-L2625DWDCP-B7650DWMFC-J6555DWMFC-L2730DWRMFC-J904NMFC-T810W(China)MFC-1916NWSP 230DNwDCP-B7628DWHL-L2385DWHL-L2365DWRMFC-J738DWNRJ-2140MFC-L2880DWHL-L3270CDWMFC-L2820DWXLHL-L6400DWGDCP-L1632WDocuPrint M115 wMFC-L2760DWHL-L1230WHL-5595DNDCP-T835DWDCP-J973N-W/BHL-1210WEMFC-EX915DWMFC-L5710DWMFC-EX670WDCP-L2550DNRHL-L5218DNMFC-L3770CDWMFC-L2700DWDCP-T725DWDCP-J1700DWDCP-L2531DWMFC-J1300DWMFC-L2765DWDocuPrint P275 dwDCP-L2530DWRMFC-L8610CDW (Japan)DocuPrint M235 dwHL-L2370DNRMFC-L2880DW (Japan)MFC-J6947DWHL-L9410CDNMFC-L2862DWMFC-L6910DNDCP-B7608WDCP-B7640DWDCP-T820DWSP-1 (Japan)DCP-L1638WMFC-L2750DW (Japan)MFC-L9577CDWDCP-T436WHL-L2460DWXLDCP-L2535DWMFC-L5750DWDCP-B7620DWMFC-L2707DWM 340WMFC-J6955DWDCP-B7640DW (Asia)HL-L6410DNMFC-L2802DWMFC-J7700CDWDocuPrint M285 zDCP-L2560DWRDCP-1612WEDCP-J988NDocuPrint M260 zDCP-L5660DNMFC-L6750DWHL-L5212DWPJ-773DCP-B7600DMFC-L2701DWDCP-L1848WDocuPrint M225 dwMFC-L3760CDWDCP-J1100DWADS-3000Nbizhub 3000MFHL-L1238WPJ-883MFC-J805DWXLDocuPrint M225 zHL-L6210DWTDCP-B7535DW (China)DCP-B7600DBMFC-J815DWXLDocuPrint P235 dDCP-L2660DW (Japan)HL-L2380DWDCP-J1200W(XL)DCP-7190DWDCP-L2552DNDCP-L2520DWHL-J6000DWDCP-1612WMFC-J6999CDWHL-1223WRMFC-L5715DWMFC-1910WMFC-L9670CDNDCP-T426WHL-B2050DNMFC-J497DWDCP-B7520DWMFC-J7600CDWHL-L6310DWMFC-L2717DWDCP-L2627DWRJ-4250WBDCP-L2540DNDCP-J772DWMFC-L3750CDWHL-3190CDWHL-L5202DWDocuPrint M118 wMFC-J1170DWMFC-L3768CDWHL-L2425DWDocuPrint P115 wDocuPrint M375 dfMFC-L9570CDW (Japan)DocuPrint M265 zMFC-T930DWDCP-J978N-W/BPT-P950NWMFC-J898NDCP-J1140DWHL-1212WDCP-1610WDCP-T236MFC-L5915DWMFC-L6702DWHL-JF1HL-L5050DNMFC-L2730DNHL-L2440DWHL-L2460DWDCP-T220HL-T4000DWDocuPrint P268 dwDCP-L2550DNMFC-L5900DWMFC-L2710DWMFC-J6530DWMFC-L2885DWHL-B2150WDCP-L2541DWHL-L2460DNHL-L2351DWMFC-L2710DNRDCP-L2648DWMFC-1915WDCP-T439WDCP-J582NDCP-T720DWHL-2595DWMFC-L6912DWMFC-L2720DWFAX-L2800DWMFC-J6957DWMFC-L2800DWMFC-7895DWDocuPrint M378 dDCP-J526NMFC-B7811DWPT-P900WMFC-T810WMFC-L2712DWDCP-J1203NDCP-L2540DWMFC-L3745CDWTD-2350DMFC-J926N-WBMFC-L2807DWHL-L2350DWRDCP-L2508DWMFC-L3765CDWMFC-B7800DNMFC-L2720DNDCP-T735DWDCP-L2551DWHL-L6402DWMFC-L5912DWMFC-L6710DWHL-L2464DWMFC-L2750DWRMFC-L5755DW (Japan)MFC-L2732DWTD-4550DNWBMFC-T925DWDCP-L5610DNMFC-L6700DWMFC-L9610CDNHL-L2420DWHL-J7010CDWHL-EX470WHL-L2445DWMFC-L8610CDWDCP-L2520DWRHL-1210WRMFC-J6540DWEMFC-L2710DNMFC-L2740DWMFC-L2820DWDCP-L3550CDWMFC-L2960DWDCP-T425WMFC-J6983CDWDCP-C421WTD-2135NWBSADocuPrint P378 dDCP-B7638DNSP 230SFNwDCP-J972NHL-L5102DWMFC-L2922DWHL-L5215DWDCP-L2600DDCP-L2532DWMFC-J1800DW (USA)MFC-J6945DWDocuPrint P288 dwMFC-L3770CDW (Japan)DCP-L3528CDWMFC-L2886DWMFC-J5730DWMFC-L2750DWXLDCP-L8410CDWHL-L2315DWDCP-L3515CDWMFC-J895DWHL-L5100DNTQL-820NWBDocuPrint P285 dwMFC-J6580CDWDCP-L2627DWXLHL-L8360CDWHL-L6202DWDCP-J982N W/BMFC-J2730DWHL-L2371DNMFC-J739DNMFC-8540DNHL-L8240CDWHL-EX415DWMFC-L6970DWDCP-B7558WMFC-L6900DWGHL-L2365DWHL-L2465DWHL-B2188DWMFC-J1605DNMFC-J5830DWHL-L2400DWEHL-1222WEMFC-L2806DWHL-L2340DWRMFC-J3540DWFAX-L2710DNDCP-B7648DWMFC-8530DNMFC-J5930DWHL-L2461DNDCP-T525WMFC-J6959DWADS-3600WHL-L6415DWMFC-J739DWNMFC-L9635CDNRJ-2050HL-L8360CDWTDCP-L2627DWEDocuPrint P268 dMFC-L2740DW (Japan)MFC-J7300CDWHL-L6210DWDCP-J587NMFC-J5800CDWMFC-L2861DWHL-L2467DWDCP-T230HL-L2447DWMFC-J5855DWHL-1210WMFC-J1012DWMFC-J491DWHL-3160CDWMFC-J6535DWMFC-J903NDCP-L5510DWHL-L2350DWDCP-J987N-W/BHL-L2480DWMFC-L2880DWXLHL-L3288CDWMFC-L2805DWHL-1223WEDocuPrint M275 zMFC-J1205W(XL)DCP-T825DWMFC-1911WDCP-T830DWMFC-L2900DWXLMFC-J7500CDWMFC-L3740CDWHL-L3228CDWHL-J6100DWDCP-9030CDNMFC-J6935DWDocuPrint M115 zDCP-J4543NMFC-L5700DWMFC-J5845DW(XL)HL-L6450DWHL-L5100DNDCP-J987N W/BMFC-1919NWHL-L2325DWHL-L2360DNDCP-L3551CDWDCP-T535DWHL-L3280CDWMFC-J890DWMFC-L5710DNHL-L9430CDNDCP-L6600DWHL-L5210DN (Japan)MFC-B7720DNMFC-L2720DWRMFC-L2750DWMFC-J6940DWDCP-L3520CDWEHL-L2370DNHL-L3230CDWDocuPrint M375 zDCP-L5600DNDCP-J982N-W/BDocuPrint M385 zDocuPrint M235 zDCP-J572DWMFC-EX910HL-1212WEMFC-J4335DW(XL)ADS-2800WMFC-L5700DNDCP-T710W(China)DCP-L5518DNMFC-L6820DWMFC-L3730CDNHL-L6300DWTMFC-J6930DWHL-L5210DWbizhub 4020iMFC-L5902DWDocuPrint P378 dwDCP-1612WRHL-L2360DWMFC-L2715DWHL-L2370DWDCP-L2660DWMFC-L2713DWHL-B2180DWBMFC-J3930DWMFC-J6555DWXLMFC-L6915DNMFC-B7715DWHL-L6250DNHL-L2305WMFC-T920DWMFC-J2330DWMFC-J939DNMFC-L3710CDWDCP-L2551DNMFC-L8900CDWDCP-1623WRTD-2135NWBHL-L3215CWMFC-J5630CDWMFC-L2920DWHL-L3290CDWMFC-L2827DWXLDCP-T710WQL-1115NWBDCP-L5650DNMFC-L5710DW (Japan)DCP-L5662DNMFC-J4440NDocuPrint P385 dwMFC-J7100CDWDCP-J4140NHL-L2370DWXLHL-L2372DNDCP-B7658DWDCP-L5502DNMFC-L2716DWMFC-J805DWMFC-L2690DWMFC-J6730DWDCP-7190DNMFC-L2980DWDCP-J774DWMFC-L8690CDWMFC-J1800DW (Europe)DocuPrint M288 dwDCP-J1200WEMFC-L6810DWMFC-L6720DWHL-2569DWMFC-L2700DWRMFC-J5335DWDocuPrint M378 dfDCP-L2620DWMFC-L2835DWMFC-9350CDWHL-L2865DWDCP-J915NMFC-T4500DWMFC-J4540NHL-L2340DWQL-820NWBcMFC-EX670MFC-7880DNDocuPrint P360 dwDCP-L5652DNDCP-J528NDCP-T225DCP-L5512DNDCP-T520WMFC-J3530DWDocuPrint M115 fwMFC-L5718DNDCP-L2622DWHL-L2395DWMFC-J995DWXLHL-L8260CDNHL-L9470CDNHL-L6400DWTDCP-7090DWHL-L2360DNRMFC-L6900DW (Japan)MFC-L2700DNHL-L2386DWHL-L6418DWDCP-L2640DWHL-L2400DWMFC-L5717DWHL-L3220CWMFC-L2700DW (Asia)DCP-B7548WHL-L6200DWMFC-L5728DWMFC-J690DWMFC-L2685DWHL-L5210DW (Japan)HL-L1808WHL-L8245CDWMFC-L5702DWHL-5590DNMFC-J998DWNHL-2590DNDCP-L2535DW (China)MFC-L6800DWDCP-L2640DNHL-L6250DWHL-L6415DNFAX-L2700DNPT-P750WMFC-J5855DWXLMFC-J4540DW(XL)RJ-3150MFC-J5330DWMFC-J3940DWMFC-L2705DWHL-L2375DWHL-L2352DWDocuPrint P118 wHL-1212WRMFC-J6583CDWDCP-L3568CDWMFC-7889DWMFC-L2827DWMFC-J4345DWXLP 201WDocuPrint P388 dwMFC-L2712DNMFC-L8340CDWDCP-T430WMFC-J6980CDWMFC-L2770DWMFC-L3740CDWETD-2135NDCP-J978N W/BMFC-J5340DWHL-L8260CDWHL-L3295CDWDCP-T510WDCP-J572NMFC-L2715DW (Taiwan/Korea/Hong Kong)HL-L2376DWDCP-1617NWDCP-7180DNDocuPrint P375 dDCP-T536DWDCP-T510W(China)DCP-L3517CDWMFC-L5802DWDCP-L5500DNHL-L6217DWMFC-L2703DWDocuPrint M268 zMFC-J6740DWMFC-J1500NDCP-T530DWDocuPrint P260 dwDCP-B7578DWMFC-7890DNHL-L3240CDWM 340FWMFC-J6997CDWMFC-J893NTD-2320DTD-2350DSAMFC-J6540DWHL-J6000CDWDCP-T428WMFC-L2805DW (Asia)TD-2135NSAHL-L5228DWMFC-L9630CDNMFC-B7810DWHL-L6412DWHL-L8230CDWDCP-L5602DNDCP-T420WRJ-3050HL-L2357DWDCP-L2628DWDCP-L1630WDCP-B7520DW (China)DCP-1616NWMFC-T910DWMFC-J4443NMFC-L3735CDNMFC-J5955DWDCP-T730DWHL-J6010DWDCP-L2518DWMFC-L2817DWDCP-L3510CDWHL-L3220CWEDCP-B7620DWBHL-L2405WHL-L2390DWDCP-T238MFC-L6900DWDCP-L3560CDWDCP-7195DWHL-L6415DWTDocuPrint P375 dwMFC-T935DWHL-B2100DHL-L2366DWMFC-J998DNMFC-L2771DWHL-1218WHL-L2475DWHL-L2361DNMFC-L5850DWHL-L6310DW (Japan)DCP-L2550DWMFC-L2710DWRDCP-L2680DWHL-5595DNHMFC-L9570CDWDCP-J1200NMFC-J5945DWMFC-J1215WDCP-L2665DWHL-1211WMFC-1912WRMFC-J5740DWDCP-L2548DWMFC-B7810DWBMFC-J4340DW(XL)DCP-B7535DWHL-L3300CDWMFC-L8395CDWMFC-J939DWNHL-L9310CDWDCP-L3555CDWbizhub 5000iMFC-9150CDNMFC-L5715DNDCP-J981NADS-2400NDCP-L2550DW (China)DCP-J1050DWDCP-T435WDCP-1610WRDCP-L2540DNRe-STUDIO301DNHL-B2181DWDCP-L2560DWDCP-J1800NDCP-J577NMFC-L8390CDWHL-L3230CDNHL-L6200DWTMFC-J4940DNMFC-L2680WHL-L3220CDWHL-L3210CWMFC-J2740DWTD-2320DSADocuPrint P265 dwDCP-1622WEMFC-L2802DNMFC-1911NWHL-L6400DWMFC-L2860DWSP-1MFC-L2730DWMFC-L5755DWHL-L2375DWRMFC-J995DWbizhub 5020iMFC-J905NDCP-B7640DWBMFC-J4440DW
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CWE ID-CWE-93
Improper Neutralization of CRLF Sequences ('CRLF Injection')
CVE-2024-52602
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5||MEDIUM
EPSS-0.12% / 30.46%
||
7 Day CHG~0.00%
Published-16 Jan, 2025 | 19:14
Updated-20 Aug, 2025 | 14:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Server-Side Request Forgery (SSRF) on redirects and federation in Matrix Media Repo

Matrix Media Repo (MMR) is a highly configurable multi-homeserver media repository for Matrix. Matrix Media Repo (MMR) is vulnerable to server-side request forgery, serving content from a private network it can access, under certain conditions. This is fixed in MMR v1.3.8. Users are advised to upgrade. Restricting which hosts MMR is allowed to contact via (local) firewall rules or a transparent proxy and may provide a workaround for users unable to upgrade.

Action-Not Available
Vendor-t2bott2bot
Product-matrix-media-repomatrix-media-repo
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2023-5122
Matching Score-4
Assigner-Grafana Labs
ShareView Details
Matching Score-4
Assigner-Grafana Labs
CVSS Score-5||MEDIUM
EPSS-0.22% / 45.08%
||
7 Day CHG-0.07%
Published-14 Feb, 2024 | 15:06
Updated-13 Feb, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SSRF in CSV Datasource Plugin

Grafana is an open-source platform for monitoring and observability. The CSV datasource plugin is a Grafana Labs maintained plugin for Grafana that allows for retrieving and processing CSV data from a remote endpoint configured by an administrator. If this plugin was configured to send requests to a bare host with no path (e.g. https://www.example.com/ https://www.example.com/` ), requests to an endpoint other than the one configured by the administrator could be triggered by a specially crafted request from any user, resulting in an SSRF vector. AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator

Action-Not Available
Vendor-Grafana Labs
Product-grafanagrafana-csv-datasource
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2020-35561
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.80% / 74.06%
||
7 Day CHG~0.00%
Published-16 Feb, 2021 | 15:49
Updated-16 Sep, 2024 | 18:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SSRF in variuos products of MB connect line and Helmholz

An issue was discovered MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. There is an SSRF in the HA module allowing an unauthenticated attacker to scan for open ports.

Action-Not Available
Vendor-mbconnectlinehelmholzn/a
Product-myrex24.virtualmymbconnect24myrex24mbconnect24n/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-50337
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.08% / 24.28%
||
7 Day CHG~0.00%
Published-02 Mar, 2026 | 14:26
Updated-03 Mar, 2026 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Chamilo: Potential unauthenticated blind SSRF via openid function

Chamilo is a learning management system. Prior to version 1.11.28, the OpenId function allows anyone to send requests to any URL on server's behalf, which results in unauthenticated blind SSRF. This issue has been patched in version 1.11.28.

Action-Not Available
Vendor-chamilochamilo
Product-chamilo_lmschamilo-lms
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2020-28977
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-10.41% / 93.25%
||
7 Day CHG~0.00%
Published-30 Nov, 2020 | 13:19
Updated-04 Aug, 2024 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Canto plugin 1.3.0 for WordPress contains blind SSRF vulnerability. It allows an unauthenticated attacker can make a request to any internal and external server via /includes/lib/get.php?subdomain=SSRF.

Action-Not Available
Vendor-canton/a
Product-canton/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2020-28976
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-42.19% / 97.46%
||
7 Day CHG+16.44%
Published-30 Nov, 2020 | 13:14
Updated-04 Aug, 2024 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Canto plugin 1.3.0 for WordPress contains a blind SSRF vulnerability. It allows an unauthenticated attacker can make a request to any internal and external server via /includes/lib/detail.php?subdomain=SSRF.

Action-Not Available
Vendor-canton/a
Product-canton/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2020-28978
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-10.41% / 93.25%
||
7 Day CHG~0.00%
Published-30 Nov, 2020 | 13:21
Updated-04 Aug, 2024 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Canto plugin 1.3.0 for WordPress contains blind SSRF vulnerability. It allows an unauthenticated attacker can make a request to any internal and external server via /includes/lib/tree.php?subdomain=SSRF.

Action-Not Available
Vendor-canton/a
Product-canton/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2026-24117
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.01% / 2.75%
||
7 Day CHG~0.00%
Published-22 Jan, 2026 | 22:05
Updated-02 Feb, 2026 | 15:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rekor affected by Server-Side Request Forgery (SSRF) via provided public key URL

Rekor is a software supply chain transparency log. In versions 1.4.3 and below, attackers can trigger SSRF to arbitrary internal services because /api/v1/index/retrieve supports retrieving a public key via user-provided URL. Since the SSRF only can trigger GET requests, the request cannot mutate state. The response from the GET request is not returned to the caller so data exfiltration is not possible. A malicious actor could attempt to probe an internal network through Blind SSRF. The issue has been fixed in version 1.5.0. To workaround this issue, disable the search endpoint with --enable_retrieve_api=false.

Action-Not Available
Vendor-sigstoreThe Linux Foundation
Product-rekorrekor
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2020-26811
Matching Score-4
Assigner-SAP SE
ShareView Details
Matching Score-4
Assigner-SAP SE
CVSS Score-5.3||MEDIUM
EPSS-0.80% / 74.22%
||
7 Day CHG~0.00%
Published-10 Nov, 2020 | 16:12
Updated-04 Aug, 2024 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SAP Commerce Cloud (Accelerator Payment Mock), versions - 1808, 1811, 1905, 2005, allows an unauthenticated attacker to submit a crafted request over a network to a particular SAP Commerce module URL which will be processed without further interaction, the crafted request leads to Server Side Request Forgery attack which could lead to retrieval of limited pieces of information about the service with no impact on integrity or availability.

Action-Not Available
Vendor-SAP SE
Product-commerce_cloud_\(accelerator_payment_mock\)SAP Commerce Cloud (Accelerator Payment Mock)
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-4894
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-5.3||MEDIUM
EPSS-0.17% / 37.98%
||
7 Day CHG~0.00%
Published-15 May, 2024 | 02:53
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ITPison OMICARD EDM - Server-Side Request Forgery

ITPison OMICARD EDM fails to properly filter specific URL parameter, allowing unauthenticated remote attackers to modify the parameters and conduct Server-Side Request Forgery (SSRF) attacks. This vulnerability enables attackers to probe internal network information.

Action-Not Available
Vendor-ITPisonitpison
Product-OMICARD EDMomicard_edm
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2023-50259
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.40% / 60.98%
||
7 Day CHG~0.00%
Published-22 Dec, 2023 | 17:00
Updated-27 Nov, 2024 | 15:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Blind SSRF in /home/testslack endpoint

Medusa is an automatic video library manager for TV shows. Versions prior to 1.0.19 are vulnerable to unauthenticated blind server-side request forgery (SSRF). The `testslack` request handler in `medusa/server/web/home/handler.py` does not validate the user-controlled `slack_webhook` variable and passes it to the `notifiers.slack_notifier.test_notify` method, then `_notify_slack` and finally `_send_slack` method, which sends a POST request to the user-controlled URL on line 103 in `/medusa/notifiers/slack.py`, which leads to a blind server-side request forgery (SSRF). This issue allows for crafting POST requests on behalf of the Medusa server. Version 1.0.19 contains a fix for the issue.

Action-Not Available
Vendor-pymedusapymedusa
Product-medusaMedusa
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2023-50258
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.46% / 63.91%
||
7 Day CHG~0.00%
Published-22 Dec, 2023 | 16:55
Updated-23 Apr, 2025 | 16:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Blind SSRF in `/home/testdiscord` endpoint

Medusa is an automatic video library manager for TV shows. Versions prior to 1.0.19 are vulnerable to unauthenticated blind server-side request forgery (SSRF). The `testDiscord` request handler in `medusa/server/web/home/handler.py` does not validate the user-controlled `discord_webhook` variable and passes it to the `notifiers.discord_notifier.test_notify` method, then `_notify_discord` and finally `_send_discord_msg` method, which sends a POST request to the user-controlled URL on line 64 in `/medusa/notifiers/discord.py`, which leads to a blind server-side request forgery. This issue allows for crafting POST requests on behalf of the Medusa server. Version 1.0.19 contains a fix for the issue.

Action-Not Available
Vendor-pymedusapymedusa
Product-medusaMedusa
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2026-25123
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.02% / 5.24%
||
7 Day CHG~0.00%
Published-06 Feb, 2026 | 21:19
Updated-18 Feb, 2026 | 18:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Homarr affected by Unauthenticated SSRF / Port-Scan Primitive via widget.app.ping

Homarr is an open-source dashboard. Prior to 1.52.0, a public (unauthenticated) tRPC endpoint widget.app.ping accepts an arbitrary url and performs a server-side request to that URL. This allows an unauthenticated attacker to trigger outbound HTTP requests from the Homarr server, enabling SSRF behavior and a reliable port-scanning primitive (open vs closed ports can be inferred from statusCode vs fetch failed and timing). This vulnerability is fixed in 1.52.0.

Action-Not Available
Vendor-homarrhomarr-labs
Product-homarrhomarr
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2023-50266
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.15% / 35.68%
||
7 Day CHG~0.00%
Published-15 Dec, 2023 | 20:42
Updated-02 Aug, 2024 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Bazarr Blind Server-Side Request Forgery (SSRF) in the /test/<protocol>/ endpoint

Bazarr manages and downloads subtitles. In version 1.2.4, the proxy method in bazarr/bazarr/app/ui.py does not validate the user-controlled protocol and url variables and passes them to requests.get() without any sanitization, which leads to a blind server-side request forgery (SSRF). This issue allows for crafting GET requests to internal and external resources on behalf of the server. 1.3.1 contains a partial fix, which limits the vulnerability to HTTP/HTTPS protocols.

Action-Not Available
Vendor-bazarrmorpheus65535
Product-bazarrbazarr
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2020-24548
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.21% / 43.75%
||
7 Day CHG~0.00%
Published-26 Aug, 2020 | 18:28
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Ericom Access Server 9.2.0 (for AccessNow and Ericom Blaze) allows SSRF to make outbound WebSocket connection requests on arbitrary TCP ports, and provides "Cannot connect to" error messages to inform the attacker about closed ports.

Action-Not Available
Vendor-ericomn/a
Product-access_servern/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2020-24710
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.46% / 64.00%
||
7 Day CHG~0.00%
Published-28 Oct, 2020 | 19:33
Updated-04 Aug, 2024 | 15:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Gophish before 0.11.0 allows SSRF attacks.

Action-Not Available
Vendor-getgophishn/a
Product-gophishn/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2023-49795
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.35% / 57.65%
||
7 Day CHG~0.00%
Published-11 Dec, 2023 | 19:01
Updated-02 Aug, 2024 | 22:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MindsDB Server-Side Request Forgery vulnerability

MindsDB connects artificial intelligence models to real time data. Versions prior to 23.11.4.1 contain a server-side request forgery vulnerability in `file.py`. This can lead to limited information disclosure. Users should use MindsDB's `staging` branch or v23.11.4.1, which contain a fix for the issue.

Action-Not Available
Vendor-mindsdbmindsdb
Product-mindsdbmindsdb
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2020-21122
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.23% / 45.25%
||
7 Day CHG~0.00%
Published-15 Sep, 2021 | 16:16
Updated-04 Aug, 2024 | 14:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

UReport v2.2.9 contains a Server-Side Request Forgery (SSRF) in the designer page which allows attackers to detect intranet device ports.

Action-Not Available
Vendor-ureport_projectn/a
Product-ureportn/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2026-22772
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.01% / 1.85%
||
7 Day CHG~0.00%
Published-12 Jan, 2026 | 20:58
Updated-05 Mar, 2026 | 13:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Fulcio vulnerable to Server-Side Request Forgery (SSRF) via MetaIssuer Regex Bypass

Fulcio is a certificate authority for issuing code signing certificates for an OpenID Connect (OIDC) identity. Prior to 1.8.5, Fulcio's metaRegex() function uses unanchored regex, allowing attackers to bypass MetaIssuer URL validation and trigger SSRF to arbitrary internal services. Since the SSRF only can trigger GET requests, the request cannot mutate state. The response from the GET request is not returned to the caller so data exfiltration is not possible. A malicious actor could attempt to probe an internal network through Blind SSRF. This vulnerability is fixed in 1.8.5.

Action-Not Available
Vendor-sigstoreThe Linux Foundation
Product-fulciofulcio
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2023-47116
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.27% / 50.58%
||
7 Day CHG~0.00%
Published-31 Jan, 2024 | 16:21
Updated-17 Jun, 2025 | 21:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Label Studio SSRF on Import Bypassing `SSRF_PROTECTION_ENABLED` Protections

Label Studio is a popular open source data labeling tool. The vulnerability affects all versions of Label Studio prior to 1.11.0 and was tested on version 1.8.2. Label Studio's SSRF protections that can be enabled by setting the `SSRF_PROTECTION_ENABLED` environment variable can be bypassed to access internal web servers. This is because the current SSRF validation is done by executing a single DNS lookup to verify that the IP address is not in an excluded subnet range. This protection can be bypassed by either using HTTP redirection or performing a DNS rebinding attack.

Action-Not Available
Vendor-humansignalHumanSignal
Product-label_studiolabel-studio
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found