Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27797: CWE-918: Server-Side Request Forgery (SSRF) in homarr-labs homarr

0
Medium
VulnerabilityCVE-2026-27797cvecve-2026-27797cwe-918
Published: Sat Mar 07 2026 (03/07/2026, 05:54:32 UTC)
Source: CVE Database V5
Vendor/Project: homarr-labs
Product: homarr

Description

CVE-2026-27797 is a Server-Side Request Forgery (SSRF) vulnerability in homarr-labs' open-source dashboard product Homarr, affecting versions prior to 1. 54. 0. The flaw allows unauthenticated remote attackers to make the Homarr server perform arbitrary outbound HTTP requests. This can be exploited to access internal network resources, including loopback and private IP ranges, from the server or container network context. The vulnerability has a CVSS score of 5. 3, indicating medium severity, with no known exploits in the wild as of now. It does not impact integrity or availability directly but can lead to information disclosure. The issue was patched in version 1. 54.

AI-Powered Analysis

AILast updated: 03/07/2026, 06:16:03 UTC

Technical Analysis

CVE-2026-27797 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Homarr open-source dashboard software developed by homarr-labs. The vulnerability exists in versions prior to 1.54.0 and allows an unauthenticated remote attacker to coerce the Homarr server into making arbitrary HTTP requests to external or internal network resources. SSRF vulnerabilities occur when an application accepts a user-supplied URL or resource identifier and fetches it server-side without proper validation or filtering. In this case, the attacker can exploit this behavior to access internal network services that are otherwise inaccessible externally, such as services on loopback addresses (127.0.0.1) or private IP ranges (e.g., 10.x.x.x, 192.168.x.x). This can be leveraged for reconnaissance, accessing sensitive internal APIs, or pivoting further into the network. The vulnerability does not require any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 5.3 (medium), reflecting the network attack vector, low complexity, no privileges required, and no user interaction needed. The impact is limited to confidentiality as the attacker can potentially retrieve internal information but cannot modify data or disrupt service directly. The vulnerability was publicly disclosed and patched in version 1.54.0 of Homarr. No known active exploits have been reported yet. Homarr is often deployed as a dashboard interface in containerized or internal environments, making internal network exposure a significant concern if the vulnerable version is internet-accessible.

Potential Impact

The primary impact of this SSRF vulnerability is unauthorized information disclosure from internal network resources that are normally inaccessible from outside the network. Attackers can leverage this to enumerate internal services, access metadata endpoints (such as cloud provider metadata APIs), or interact with internal management interfaces. This can lead to further compromise if sensitive information or credentials are exposed. While the vulnerability does not directly allow code execution or denial of service, the ability to reach internal systems can facilitate lateral movement or privilege escalation in complex environments. Organizations exposing Homarr dashboards to untrusted networks or the internet face increased risk. Containerized deployments may also be at risk if network segmentation is insufficient. The medium CVSS score reflects moderate risk, but the actual impact depends on the internal network architecture and what services are accessible from the Homarr host. Since no authentication is required, any attacker with network access to the vulnerable Homarr instance can exploit this flaw, increasing the attack surface.

Mitigation Recommendations

The primary mitigation is to upgrade Homarr to version 1.54.0 or later, where this SSRF vulnerability has been patched. Until an upgrade can be performed, organizations should restrict network access to the Homarr dashboard to trusted internal users only, using network segmentation, firewalls, or VPNs. Implement strict egress filtering on the Homarr host or container to prevent unauthorized outbound HTTP requests to internal or sensitive IP ranges. Employ Web Application Firewalls (WAFs) with rules to detect and block SSRF patterns targeting internal IP addresses. Monitor logs for unusual outbound requests originating from the Homarr server. Additionally, review and harden internal services that could be targeted via SSRF, such as metadata services or admin interfaces, by enforcing authentication and access controls. Conduct regular vulnerability scanning and penetration testing to detect SSRF and other web application vulnerabilities. Finally, educate development teams on secure coding practices to validate and sanitize user-supplied URLs or inputs that trigger server-side requests.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T02:31:33.266Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69abbf1fc48b3f10ff5c73ae

Added to database: 3/7/2026, 6:01:03 AM

Last enriched: 3/7/2026, 6:16:03 AM

Last updated: 3/7/2026, 9:16:53 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses