Home

Description

Ech0 is an open-source, self-hosted publishing platform for personal idea sharing. Prior to 4.2.8, Ech0 implements link preview (editor fetches a page title) through GET /api/website/title. That is legitimate product behavior, but the implementation is unsafe: the route is unauthenticated, accepts a fully attacker-controlled URL, performs a server-side GET, reads the entire response body into memory (io.ReadAll). There is no host allowlist, no SSRF filter, and InsecureSkipVerify: true on the outbound client. Anyone who can reach the instance can force the Ech0 server to open HTTP/HTTPS URLs of their choice as seen from the server’s network position (Docker bridge, VPC, localhost from the process view). This vulnerability is fixed in 4.2.8.

PUBLISHED Reserved 2026-03-31 | Published 2026-04-06 | Updated 2026-04-07 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

< 4.2.8
affected

References

github.com/...w/Ech0/security/advisories/GHSA-wc4h-2348-jc3p exploit

github.com/...w/Ech0/security/advisories/GHSA-wc4h-2348-jc3p

cve.org (CVE-2026-35036)

nvd.nist.gov (CVE-2026-35036)

Download JSON