CVE-2026-42281 - Vulnerability Analysis
CriticalLast Updated: May 14, 2026
MagicMirror - Server-Side Request Forgery
Overview
MagicMirror <= 2.35.0 contains a server-side request forgery vulnerability in the /cors endpoint, allowing unauthenticated attackers to make arbitrary HTTP requests and exfiltrate server-side secrets via environment variable expansion.
Severity & Score
Impact
A remote unauthenticated attacker can force the MagicMirror server to request localhost, internal network, and cloud metadata endpoints. In affected configurations, the endpoint can return server-side responses to the attacker.
Mitigation
Upgrade MagicMirror to version 2.36.0 or later.
References
Social Media Activity(2 posts)
🚨 CVE-2026-42281: CRITICAL SSRF in MagicMirror² (<2.36.0)! /cors endpoint lets unauthenticated attackers scan internal networks & exfiltrate environment secrets. Upgrade to 2.36.0+ now! https://radar.offseq.com/threat/cve-2026-42281-cwe-918-server-side-request-forgery-3c9e7191 #OffSeq #SSRF #MagicMirror #Vuln
View original post🚨 CVE-2026-42281: CRITICAL SSRF in MagicMirror² (<2.36.0)! /cors endpoint lets unauthenticated attackers scan internal networks & exfiltrate environment secrets. Upgrade to 2.36.0+ now! https://radar.offseq.com/threat/cve-2026-42281-cwe-918-server-side-request-forgery-3c9e7191 #OffSeq #SSRF #MagicMirror #Vuln
View original postGitHub Repositories(1 repo)
Related Resources
Details
- CVE ID
- CVE-2026-42281
- Severity
- Critical
- Type
- server_side_request_forgery
- Status
- unconfirmed
- EPSS
- 0.0%
- Nuclei
- Available
- Social Posts
- 2
CWE
- CWE-918
CVSS Metrics
N/A