CVE-2026-27696: CWE-918: Server-Side Request Forgery (SSRF) in dgtlmoon changedetection.io
changedetection.io is a free open source web page change detection tool. In versions prior to 0.54.1, changedetection.io is vulnerable to Server-Side Request Forgery (SSRF) because the URL validation function `is_safe_valid_url()` does not validate the resolved IP address of watch URLs against private, loopback, or link-local address ranges. An authenticated user (or any user when no password is configured, which is the default) can add a watch for internal network URLs. The application fetches these URLs server-side, stores the response content, and makes it viewable through the web UI — enabling full data exfiltration from internal services. Version 0.54.1 contains a fix for the issue.
AI Analysis
Technical Summary
changedetection.io is an open-source tool designed to monitor web page changes by fetching and storing content from user-specified URLs. In versions before 0.54.1, it contains a Server-Side Request Forgery (SSRF) vulnerability (CVE-2026-27696, CWE-918) due to insufficient validation in the is_safe_valid_url() function. This function fails to verify the resolved IP addresses of URLs against private, loopback, or link-local address spaces, allowing attackers to specify internal network addresses. An attacker with authentication, or any user if no password is configured (the default), can add watch URLs pointing to internal services. The application fetches these URLs server-side and stores the response content, which is then accessible through the web UI. This behavior enables attackers to exfiltrate sensitive data from internal systems that are otherwise inaccessible externally. The vulnerability does not require user interaction and can be exploited remotely over the network. The CVSS v3.1 score of 8.6 reflects the high impact on confidentiality with no impact on integrity or availability. The scope is considered changed because the vulnerability allows access to internal network resources beyond the application boundary. The issue was addressed in version 0.54.1 by improving URL validation to block private and local IP ranges. No known exploits are reported in the wild yet, but the vulnerability is critical due to the potential for internal data exposure.
Potential Impact
This SSRF vulnerability poses a significant risk to organizations deploying changedetection.io versions prior to 0.54.1, especially those exposing the service to untrusted users or with weak authentication configurations. Attackers can leverage this flaw to access internal network services that are otherwise protected by firewalls or network segmentation, potentially extracting sensitive information such as internal APIs, metadata services, or configuration endpoints. The confidentiality breach can lead to further attacks, including lateral movement, reconnaissance, or data leakage. Since the vulnerability does not affect integrity or availability directly, the primary concern is unauthorized data disclosure. Organizations relying on changedetection.io in environments with sensitive internal resources are at heightened risk. The default configuration without password protection exacerbates the threat by allowing unauthenticated exploitation. The vulnerability's network-exploitable nature and lack of user interaction requirement increase the likelihood of automated attacks once public awareness grows.
Mitigation Recommendations
Organizations should immediately upgrade changedetection.io to version 0.54.1 or later, which contains the fix for this SSRF vulnerability. If upgrading is not immediately feasible, administrators should enforce strong authentication mechanisms, ensuring that password protection is enabled to prevent unauthenticated access. Network-level controls such as firewall rules or web application firewalls (WAFs) can be configured to restrict outbound HTTP requests from the changedetection.io server to internal IP ranges, effectively blocking SSRF attempts. Additionally, administrators should audit existing watch URLs for any internal addresses and remove suspicious entries. Monitoring and logging outbound requests from the application can help detect exploitation attempts. Implementing network segmentation to isolate the changedetection.io server from sensitive internal services further reduces risk. Finally, educating users about the risks of SSRF and enforcing strict input validation policies in any custom integrations can help prevent similar issues.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Japan, South Korea, India
CVE-2026-27696: CWE-918: Server-Side Request Forgery (SSRF) in dgtlmoon changedetection.io
Description
changedetection.io is a free open source web page change detection tool. In versions prior to 0.54.1, changedetection.io is vulnerable to Server-Side Request Forgery (SSRF) because the URL validation function `is_safe_valid_url()` does not validate the resolved IP address of watch URLs against private, loopback, or link-local address ranges. An authenticated user (or any user when no password is configured, which is the default) can add a watch for internal network URLs. The application fetches these URLs server-side, stores the response content, and makes it viewable through the web UI — enabling full data exfiltration from internal services. Version 0.54.1 contains a fix for the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
changedetection.io is an open-source tool designed to monitor web page changes by fetching and storing content from user-specified URLs. In versions before 0.54.1, it contains a Server-Side Request Forgery (SSRF) vulnerability (CVE-2026-27696, CWE-918) due to insufficient validation in the is_safe_valid_url() function. This function fails to verify the resolved IP addresses of URLs against private, loopback, or link-local address spaces, allowing attackers to specify internal network addresses. An attacker with authentication, or any user if no password is configured (the default), can add watch URLs pointing to internal services. The application fetches these URLs server-side and stores the response content, which is then accessible through the web UI. This behavior enables attackers to exfiltrate sensitive data from internal systems that are otherwise inaccessible externally. The vulnerability does not require user interaction and can be exploited remotely over the network. The CVSS v3.1 score of 8.6 reflects the high impact on confidentiality with no impact on integrity or availability. The scope is considered changed because the vulnerability allows access to internal network resources beyond the application boundary. The issue was addressed in version 0.54.1 by improving URL validation to block private and local IP ranges. No known exploits are reported in the wild yet, but the vulnerability is critical due to the potential for internal data exposure.
Potential Impact
This SSRF vulnerability poses a significant risk to organizations deploying changedetection.io versions prior to 0.54.1, especially those exposing the service to untrusted users or with weak authentication configurations. Attackers can leverage this flaw to access internal network services that are otherwise protected by firewalls or network segmentation, potentially extracting sensitive information such as internal APIs, metadata services, or configuration endpoints. The confidentiality breach can lead to further attacks, including lateral movement, reconnaissance, or data leakage. Since the vulnerability does not affect integrity or availability directly, the primary concern is unauthorized data disclosure. Organizations relying on changedetection.io in environments with sensitive internal resources are at heightened risk. The default configuration without password protection exacerbates the threat by allowing unauthenticated exploitation. The vulnerability's network-exploitable nature and lack of user interaction requirement increase the likelihood of automated attacks once public awareness grows.
Mitigation Recommendations
Organizations should immediately upgrade changedetection.io to version 0.54.1 or later, which contains the fix for this SSRF vulnerability. If upgrading is not immediately feasible, administrators should enforce strong authentication mechanisms, ensuring that password protection is enabled to prevent unauthenticated access. Network-level controls such as firewall rules or web application firewalls (WAFs) can be configured to restrict outbound HTTP requests from the changedetection.io server to internal IP ranges, effectively blocking SSRF attempts. Additionally, administrators should audit existing watch URLs for any internal addresses and remove suspicious entries. Monitoring and logging outbound requests from the application can help detect exploitation attempts. Implementing network segmentation to isolate the changedetection.io server from sensitive internal services further reduces risk. Finally, educating users about the risks of SSRF and enforcing strict input validation policies in any custom integrations can help prevent similar issues.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-23T17:56:51.202Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699e80ffb7ef31ef0bd6da90
Added to database: 2/25/2026, 4:56:31 AM
Last enriched: 2/25/2026, 5:10:50 AM
Last updated: 4/11/2026, 12:52:15 PM
Views: 81
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.