Home

Description

MISP modules are autonomous modules that can be used to extend MISP for new services. Prior to 3.0.7, an unsafe remote resource fetching vulnerability existed in MISP Modules expansion modules. The html_to_markdown module accepted arbitrary HTTP(S) URLs without sufficient validation, which could allow Server-Side Request Forgery against loopback, private, or link-local network resources. Additionally, the qrcode module disabled TLS certificate verification when retrieving remote images, exposing requests to potential man-in-the-middle interception or response tampering. The issue was fixed by validating URL schemes, blocking local and private address ranges, resolving hostnames before fetching, enforcing request timeouts, and re-enabling TLS certificate verification. This vulnerability is fixed in 3.0.7.

PUBLISHED Reserved 2026-05-05 | Published 2026-05-13 | Updated 2026-05-14 | Assigner GitHub_M




MEDIUM: 5.8CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:H/SI:H/SA:H

Problem types

CWE-295: Improper Certificate Validation

CWE-918: Server-Side Request Forgery (SSRF)

Product status

< 3.0.7
affected

References

github.com/...odules/security/advisories/GHSA-fhq3-2gf3-8f3j

github.com/...ommit/01a522f2772fc31eeed379ccf23750c8a3d401db

cve.org (CVE-2026-44363)

nvd.nist.gov (CVE-2026-44363)

Download JSON