CVE-2026-28677 - Vulnerability Analysis
HighCVSS: 8.2Last Updated: March 6, 2026
OpenSift - Server Side Request Forgery
Published: March 6, 2026Updated: March 6, 2026Remote Exploitable
Overview
OpenSift < 1.6.3-alpha contains a server side request forgery caused by incomplete destination restrictions in the URL ingest pipeline, letting attackers perform SSRF attacks via credentialed URLs, non-standard ports, and cross-host redirects, exploit requires network access to the URL ingest pipeline.
Severity & Score
Severity: High
CVSS Score: 8.2
Impact
Attackers can perform SSRF attacks to access internal or restricted network resources, potentially leading to information disclosure or further network compromise.
Mitigation
Update to version 1.6.3-alpha or later.
References
- https://github.com/OpenSift/OpenSift/releases/tag/v1.6.3-alpha
- https://github.com/OpenSift/OpenSift/security/advisories/GHSA-5jfc-p787-2mf9
- https://github.com/OpenSift/OpenSift/commit/1126e0a503876056a68a434e19f64158a5a4840b
- https://github.com/OpenSift/OpenSift/commit/de99b9c
- https://github.com/OpenSift/OpenSift/pull/67
Related Resources
Details
- CVE ID
- CVE-2026-28677
- Severity
- High
- CVSS Score
- 8.2
- Type
- server_side_request_forgery
- Status
- new
CWE
- CWE-918
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L