Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26957: CWE-209: Generation of Error Message Containing Sensitive Information in abhinavxd github.com/abhinavxd/libredesk

0
Medium
VulnerabilityCVE-2026-26957cvecve-2026-26957cwe-209cwe-918
Published: Thu Feb 19 2026 (02/19/2026, 23:30:48 UTC)
Source: CVE Database V5
Vendor/Project: abhinavxd
Product: github.com/abhinavxd/libredesk

Description

CVE-2026-26957 is a medium severity vulnerability in the self-hosted customer support application Libredesk prior to version 1. 0. 2-0. 20260215211005-727213631ce6. The flaw arises from improper validation of destination URLs for webhooks, allowing an authenticated Application Admin to coerce the server into making HTTP requests to arbitrary internal or cloud infrastructure endpoints. This can lead to unauthorized access or information disclosure within internal networks. The vulnerability is linked to CWE-209 (generation of error messages containing sensitive information) and CWE-918 (server-side request forgery). No known exploits are currently reported in the wild. The issue has been addressed in the specified patched version. Organizations using vulnerable versions should upgrade promptly to mitigate risk.

AI-Powered Analysis

AILast updated: 02/20/2026, 00:01:27 UTC

Technical Analysis

Libredesk, a self-hosted customer support desk application, suffers from a vulnerability identified as CVE-2026-26957, which affects all versions prior to 1.0.2-0.20260215211005-727213631ce6. The root cause is the failure to properly validate destination URLs configured for webhooks. Specifically, an attacker with authenticated Application Admin privileges can manipulate webhook destination URLs to force the Libredesk server to initiate HTTP requests to arbitrary internal or cloud infrastructure addresses. This behavior constitutes a server-side request forgery (SSRF) vulnerability (CWE-918). Additionally, the vulnerability involves CWE-209, indicating that error messages generated may leak sensitive information, potentially aiding attackers in reconnaissance or exploitation. The CVSS 4.0 base score is 6.9 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required beyond admin authentication, and limited scope impact. Exploitation could allow attackers to access internal services not normally exposed externally, potentially compromising cloud infrastructure or internal corporate networks hosting the service. The vulnerability has been fixed in version 1.0.2-0.20260215211005-727213631ce6. No public exploits are known at this time.

Potential Impact

The primary impact of this vulnerability is the potential compromise of internal network resources and cloud infrastructure through SSRF attacks initiated by the vulnerable Libredesk server. An attacker with Application Admin credentials can pivot into internal systems that are otherwise inaccessible externally, potentially leading to unauthorized data access, lateral movement, or disruption of internal services. Sensitive information may also be leaked via error messages, aiding attackers in further exploitation. Organizations relying on Libredesk for customer support risk exposure of internal assets, which could lead to data breaches, service interruptions, or escalation of privileges within their environment. The impact is heightened in environments where Libredesk is deployed in cloud or hybrid infrastructures with sensitive internal services behind firewalls.

Mitigation Recommendations

1. Upgrade Libredesk immediately to version 1.0.2-0.20260215211005-727213631ce6 or later, where the vulnerability is patched. 2. Restrict Application Admin privileges strictly to trusted personnel to reduce the risk of malicious exploitation. 3. Implement network segmentation and firewall rules to limit the Libredesk server's ability to reach sensitive internal endpoints, minimizing SSRF impact. 4. Monitor and audit webhook configurations regularly for unauthorized or suspicious destination URLs. 5. Employ web application firewalls (WAFs) with SSRF detection capabilities to detect and block malicious outbound requests. 6. Review and sanitize error messages to avoid leaking sensitive information, aligning with CWE-209 mitigation best practices. 7. Conduct internal penetration testing focusing on SSRF vectors to identify residual risks. 8. Maintain up-to-date logging and alerting on unusual outbound HTTP requests from the Libredesk server.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-16T22:20:28.611Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6997a0f9d7880ec89b3c537a

Added to database: 2/19/2026, 11:47:05 PM

Last enriched: 2/20/2026, 12:01:27 AM

Last updated: 2/20/2026, 2:17:13 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats