CVE-2026-27600: CWE-918: Server-Side Request Forgery (SSRF) in sysadminsmedia homebox
HomeBox is a home inventory and organization system. Prior to 0.24.0-rc.1, the notifier functionality allows authenticated users to specify arbitrary URLs to which the application sends HTTP POST requests. No validation or restriction is applied to the supplied host, IP address, or port. Although the application does not return the response body from the target service, its UI behavior differs depending on the network state of the destination. This creates a behavioral side-channel that enables internal service enumeration. This vulnerability is fixed in 0.24.0-rc.1.
AI Analysis
Technical Summary
CVE-2026-27600 is a medium-severity Server-Side Request Forgery (SSRF) vulnerability identified in the HomeBox home inventory and organization system developed by sysadminsmedia. The issue exists in versions prior to 0.24.0-rc.1 within the notifier functionality, which allows authenticated users to specify arbitrary URLs to which the application sends HTTP POST requests. Critically, the application performs no validation or restrictions on the host, IP address, or port supplied by the user. Although the response body from the target service is not returned to the user, the application's user interface behavior changes based on the network state of the destination URL. This behavioral side-channel can be exploited to enumerate internal services and network topology, potentially exposing sensitive internal infrastructure details. The vulnerability requires an attacker to have valid authentication credentials but does not require additional user interaction. The CVSS v3.1 base score is 5.0, reflecting network attack vector, low attack complexity, required privileges, no user interaction, and limited confidentiality impact without integrity or availability effects. The vulnerability was reserved on February 20, 2026, and published on March 3, 2026. No known exploits have been reported in the wild. The issue is resolved in HomeBox version 0.24.0-rc.1 by implementing proper validation and restrictions on the URLs accepted by the notifier functionality.
Potential Impact
The primary impact of CVE-2026-27600 is the potential for internal network reconnaissance by authenticated attackers. By exploiting the SSRF vulnerability, attackers can probe internal services that are otherwise inaccessible externally, gaining insights into internal IP addresses, open ports, and service availability. This information can be leveraged to plan further attacks such as lateral movement, privilege escalation, or exploitation of internal-only services. Although the vulnerability does not directly allow data exfiltration or service disruption, the exposure of internal network topology can significantly increase the attack surface and risk profile of affected organizations. Since the vulnerability requires authentication, the risk is limited to users with valid credentials, but insider threats or compromised accounts could exploit it. Organizations relying on HomeBox for home inventory management, especially those integrating it into broader network environments, may inadvertently expose internal infrastructure details. The lack of known exploits in the wild suggests limited active exploitation currently, but the vulnerability's presence in a network-facing application warrants prompt remediation to prevent future attacks.
Mitigation Recommendations
To mitigate CVE-2026-27600, organizations should immediately upgrade HomeBox to version 0.24.0-rc.1 or later, where the vulnerability is fixed. Until an upgrade is possible, restrict access to the notifier functionality to trusted users only, minimizing the number of authenticated users who can specify arbitrary URLs. Implement network segmentation and firewall rules to limit the HomeBox server's ability to initiate outbound HTTP requests to internal services, thereby reducing the impact of SSRF attempts. Monitor logs for unusual notifier usage patterns or unexpected HTTP POST requests to internal IP ranges. Employ multi-factor authentication to reduce the risk of credential compromise. Additionally, conduct regular audits of user privileges within HomeBox to ensure only necessary users have access to sensitive features. Finally, consider deploying web application firewalls (WAFs) that can detect and block SSRF patterns targeting internal resources.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, India
CVE-2026-27600: CWE-918: Server-Side Request Forgery (SSRF) in sysadminsmedia homebox
Description
HomeBox is a home inventory and organization system. Prior to 0.24.0-rc.1, the notifier functionality allows authenticated users to specify arbitrary URLs to which the application sends HTTP POST requests. No validation or restriction is applied to the supplied host, IP address, or port. Although the application does not return the response body from the target service, its UI behavior differs depending on the network state of the destination. This creates a behavioral side-channel that enables internal service enumeration. This vulnerability is fixed in 0.24.0-rc.1.
AI-Powered Analysis
Technical Analysis
CVE-2026-27600 is a medium-severity Server-Side Request Forgery (SSRF) vulnerability identified in the HomeBox home inventory and organization system developed by sysadminsmedia. The issue exists in versions prior to 0.24.0-rc.1 within the notifier functionality, which allows authenticated users to specify arbitrary URLs to which the application sends HTTP POST requests. Critically, the application performs no validation or restrictions on the host, IP address, or port supplied by the user. Although the response body from the target service is not returned to the user, the application's user interface behavior changes based on the network state of the destination URL. This behavioral side-channel can be exploited to enumerate internal services and network topology, potentially exposing sensitive internal infrastructure details. The vulnerability requires an attacker to have valid authentication credentials but does not require additional user interaction. The CVSS v3.1 base score is 5.0, reflecting network attack vector, low attack complexity, required privileges, no user interaction, and limited confidentiality impact without integrity or availability effects. The vulnerability was reserved on February 20, 2026, and published on March 3, 2026. No known exploits have been reported in the wild. The issue is resolved in HomeBox version 0.24.0-rc.1 by implementing proper validation and restrictions on the URLs accepted by the notifier functionality.
Potential Impact
The primary impact of CVE-2026-27600 is the potential for internal network reconnaissance by authenticated attackers. By exploiting the SSRF vulnerability, attackers can probe internal services that are otherwise inaccessible externally, gaining insights into internal IP addresses, open ports, and service availability. This information can be leveraged to plan further attacks such as lateral movement, privilege escalation, or exploitation of internal-only services. Although the vulnerability does not directly allow data exfiltration or service disruption, the exposure of internal network topology can significantly increase the attack surface and risk profile of affected organizations. Since the vulnerability requires authentication, the risk is limited to users with valid credentials, but insider threats or compromised accounts could exploit it. Organizations relying on HomeBox for home inventory management, especially those integrating it into broader network environments, may inadvertently expose internal infrastructure details. The lack of known exploits in the wild suggests limited active exploitation currently, but the vulnerability's presence in a network-facing application warrants prompt remediation to prevent future attacks.
Mitigation Recommendations
To mitigate CVE-2026-27600, organizations should immediately upgrade HomeBox to version 0.24.0-rc.1 or later, where the vulnerability is fixed. Until an upgrade is possible, restrict access to the notifier functionality to trusted users only, minimizing the number of authenticated users who can specify arbitrary URLs. Implement network segmentation and firewall rules to limit the HomeBox server's ability to initiate outbound HTTP requests to internal services, thereby reducing the impact of SSRF attempts. Monitor logs for unusual notifier usage patterns or unexpected HTTP POST requests to internal IP ranges. Employ multi-factor authentication to reduce the risk of credential compromise. Additionally, conduct regular audits of user privileges within HomeBox to ensure only necessary users have access to sensitive features. Finally, consider deploying web application firewalls (WAFs) that can detect and block SSRF patterns targeting internal resources.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-20T19:43:14.602Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a761b1d1a09e29cb80d3ff
Added to database: 3/3/2026, 10:33:21 PM
Last enriched: 3/3/2026, 10:47:41 PM
Last updated: 3/4/2026, 7:17:58 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2732: CWE-862 Missing Authorization in shortpixel Enable Media Replace
MediumCVE-2026-2363: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in cbutlerjr WP-Members Membership Plugin
MediumCVE-2026-2025: CWE-200 Information Exposure in Mail Mint
HighCVE-2026-27012: CWE-306: Missing Authentication for Critical Function in devcode-it openstamanager
CriticalCVE-2026-28289: CWE-434: Unrestricted Upload of File with Dangerous Type in freescout-help-desk freescout
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.