CVE-2026-41461
| Summary |
SocialEngine versions 7.8.0 and prior contain a blind server-side request forgery vulnerability in the /core/link/preview endpoint where user-supplied input passed via the uri request parameter is not sanitized before being used to construct outbound HTTP requests. Authenticated remote attackers can supply arbitrary URLs including internal network addresses and loopback addresses to cause the server to issue HTTP requests to attacker-controlled destinations, enabling internal network enumeration and access to services not intended to be externally reachable.
|
| Publication Date |
April 24, 2026, 12:37 a.m. |
| Registration Date |
April 25, 2026, 4:06 a.m. |
| Last Update |
April 24, 2026, 11:50 p.m. |
|
CVSS3.1 : HIGH
|
| スコア |
8.5
|
| Vector |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N |
| 攻撃元区分(AV) |
ネットワーク |
| 攻撃条件の複雑さ(AC) |
低 |
| 攻撃に必要な特権レベル(PR) |
低 |
| 利用者の関与(UI) |
不要 |
| 影響の想定範囲(S) |
変更あり |
| 機密性への影響(C) |
高 |
| 完全性への影響(I) |
低 |
| 可用性への影響(A) |
なし |
Related information, measures and tools
Common Vulnerabilities List