CVE-2026-28677 - Vulnerability Analysis
HighCVSS: 8.2Last Updated: March 9, 2026
OpenSift - Server Side Request Forgery
Overview
OpenSift < 1.6.3-alpha contains a server side request forgery caused by incomplete destination restrictions in the URL ingest pipeline, letting attackers perform SSRF attacks via credentialed URLs, non-standard ports, and cross-host redirects, exploit requires network access to the URL ingest pipeline.
Severity & Score
Impact
Attackers can perform SSRF attacks to access internal or restricted network resources, potentially leading to information disclosure or further network compromise.
Mitigation
Update to version 1.6.3-alpha or later.
References
- https://github.com/OpenSift/OpenSift/releases/tag/v1.6.3-alpha
- https://github.com/OpenSift/OpenSift/security/advisories/GHSA-5jfc-p787-2mf9
- https://github.com/OpenSift/OpenSift/commit/1126e0a503876056a68a434e19f64158a5a4840b
- https://github.com/OpenSift/OpenSift/commit/de99b9c
- https://github.com/OpenSift/OpenSift/pull/67
Social Media Activity(1 post)
š CVE-2026-28677 - High (8.2) OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Prior to version 1.6.3-alpha, the URL ingest pipeline accepted user-controlled remote URLs with incomplete destination restrictions. Although p... š https://www.thehackerwire.com/vulnerability/CVE-2026-28677/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-28677
- Severity
- High
- CVSS Score
- 8.2
- Type
- server_side_request_forgery
- Status
- unconfirmed
- EPSS
- 4.4%
- Social Posts
- 1
CWE
- CWE-918
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L