LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-28677

CVE-2026-28677 - Vulnerability Analysis

HighCVSS: 8.2

Last Updated: March 9, 2026

OpenSift - Server Side Request Forgery

Published: March 6, 2026Updated: March 9, 2026Remote Exploitable

Overview

OpenSift < 1.6.3-alpha contains a server side request forgery caused by incomplete destination restrictions in the URL ingest pipeline, letting attackers perform SSRF attacks via credentialed URLs, non-standard ports, and cross-host redirects, exploit requires network access to the URL ingest pipeline.

Severity & Score

Severity: High
CVSS Score: 8.2
EPSS Score: 4.4%(Probability of exploitation in next 30 days)

Impact

Attackers can perform SSRF attacks to access internal or restricted network resources, potentially leading to information disclosure or further network compromise.

Mitigation

Update to version 1.6.3-alpha or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 6, 2026

🟠 CVE-2026-28677 - High (8.2) OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Prior to version 1.6.3-alpha, the URL ingest pipeline accepted user-controlled remote URLs with incomplete destination restrictions. Although p... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-28677/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-28677
Severity
High
CVSS Score
8.2
Type
server_side_request_forgery
Status
unconfirmed
EPSS
4.4%
Social Posts
1

CWE

  • CWE-918

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L

EPSS Score

4.4%Probability of exploitation in the next 30 days