CVE-2026-43929 - Vulnerability Analysis
HighCVSS: 8.2Last Updated: May 12, 2026
ssrfcheck - Server-Side Request Forgery
Published: May 12, 2026Updated: May 12, 2026Remote Exploitable
Overview
ssrfcheck <= 1.3.0 contains a server-side request forgery caused by improper handling of IPv4-mapped IPv6 addresses in URL parsing, letting attackers bypass private IP blocking and perform SSRF, exploit requires user-supplied URLs.
Severity & Score
Severity: High
CVSS Score: 8.2
Impact
Attackers can bypass SSRF protections to access internal network resources, potentially exposing sensitive data or services.
Mitigation
Update to a version later than 1.3.0 that properly handles IPv4-mapped IPv6 addresses.
Related Resources
Details
- CVE ID
- CVE-2026-43929
- Severity
- High
- CVSS Score
- 8.2
- Type
- server_side_request_forgery
- Status
- new
CWE
- CWE-184
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N