Home

Description

SocialEngine versions 7.8.0 and prior contain a blind server-side request forgery vulnerability in the /core/link/preview endpoint where user-supplied input passed via the uri request parameter is not sanitized before being used to construct outbound HTTP requests. Authenticated remote attackers can supply arbitrary URLs including internal network addresses and loopback addresses to cause the server to issue HTTP requests to attacker-controlled destinations, enabling internal network enumeration and access to services not intended to be externally reachable.

PUBLISHED Reserved 2026-04-20 | Published 2026-04-23 | Updated 2026-04-23 | Assigner VulnCheck




MEDIUM: 6.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:L/SA:N

HIGH: 8.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N

Problem types

CWE-918 Server-Side Request Forgery (SSRF)

Product status

Default status
unknown

Any version
affected

Credits

Egidio Romano finder

References

karmainsecurity.com/KIS-2026-07 technical-description

socialengine.com product

www.vulncheck.com/...engine-blind-ssrf-via-core-link-preview third-party-advisory

cve.org (CVE-2026-41461)

nvd.nist.gov (CVE-2026-41461)

Download JSON