NVD Vulnerability Detail
Search Exploit, PoC
CVE-2026-39922
Summary

GeoNode versions 4.4.5 and 5.0.2 (and prior within their respective releases) contain a server-side request forgery vulnerability in the service registration endpoint that allows authenticated attackers to trigger outbound network requests to arbitrary URLs by submitting a crafted service URL during form validation. Attackers can probe internal network targets including loopback addresses, RFC1918 private IP ranges, link-local addresses, and cloud metadata services by exploiting insufficient URL validation in the WMS service handler without private IP filtering or allowlist enforcement.

Publication Date April 11, 2026, 5:16 a.m.
Registration Date April 15, 2026, 11:37 a.m.
Last Update April 16, 2026, 10:16 a.m.
CVSS3.1 : MEDIUM
スコア 6.3
Vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR)
利用者の関与(UI) 不要
影響の想定範囲(S) 変更なし
機密性への影響(C)
完全性への影響(I)
可用性への影響(A)
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:geosolutionsgroup:geonode:*:*:*:*:*:*:*:* 4.0.0 4.4.5
cpe:2.3:a:geosolutionsgroup:geonode:*:*:*:*:*:*:*:* 5.0.0 5.0.2
Related information, measures and tools
Common Vulnerabilities List