Home

Description

Server-Side Request Forgery (SSRF) vulnerability in Sonatype Nexus Repository 3 versions 3.0.0 and later allows authenticated administrators to configure proxy repositories with URLs that can access unintended network destinations, potentially including cloud metadata services and internal network resources. A workaround configuration is available starting in version 3.88.0, but the product remains vulnerable by default.

PUBLISHED Reserved 2026-01-05 | Published 2026-01-14 | Updated 2026-01-14 | Assigner Sonatype




MEDIUM: 6.2CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N

Problem types

CWE-918 Server-Side Request Forgery (SSRF)

Product status

Default status
unaffected

3.0.0 (semver) before *
affected

Credits

Kazuma Matsumoto of GMO Cybersecurity by IERAE, Inc. finder

References

support.sonatype.com/hc/en-us/articles/47928855816595 vendor-advisory

cve.org (CVE-2026-0600)

nvd.nist.gov (CVE-2026-0600)

Download JSON