Home

Description

Idno is a social publishing platform. Prior to version 1.6.4, a logic error in the API authentication flow causes the CSRF protection on the URL unfurl service endpoint to be trivially bypassed by any unauthenticated remote attacker. Combined with the absence of a login requirement on the endpoint itself, this allows an attacker to force the server to make arbitrary outbound HTTP requests to any host, including internal network addresses and cloud instance metadata services, and retrieve the response content. This issue has been patched in version 1.6.4.

PUBLISHED Reserved 2026-02-27 | Published 2026-03-06 | Updated 2026-03-06 | Assigner GitHub_M




CRITICAL: 9.2CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

< 1.6.4
affected

References

github.com/idno/idno/security/advisories/GHSA-fcrh-fqxh-6fx6

github.com/idno/idno/releases/tag/1.6.4

cve.org (CVE-2026-28508)

nvd.nist.gov (CVE-2026-28508)

Download JSON