Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30247: CWE-918: Server-Side Request Forgery (SSRF) in Tencent WeKnora

0
Medium
VulnerabilityCVE-2026-30247cvecve-2026-30247cwe-918
Published: Sat Mar 07 2026 (03/07/2026, 03:33:27 UTC)
Source: CVE Database V5
Vendor/Project: Tencent
Product: WeKnora

Description

WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.2.12, the application's "Import document via URL" feature is vulnerable to Server-Side Request Forgery (SSRF) through HTTP redirects. While the backend implements comprehensive URL validation (blocking private IPs, loopback addresses, reserved hostnames, and cloud metadata endpoints), it fails to validate redirect targets. An attacker can bypass all protections by using a redirect chain, forcing the server to access internal services. Additionally, Docker-specific internal addresses like host.docker.internal are not blocked. This issue has been patched in version 0.2.12.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/14/2026, 19:44:30 UTC

Technical Analysis

Tencent WeKnora is an LLM-powered framework for deep document understanding and semantic retrieval. Versions prior to 0.2.12 contain a Server-Side Request Forgery (SSRF) vulnerability (CVE-2026-30247) in the "Import document via URL" feature. Although the backend implements comprehensive URL validation to block private IP ranges, loopback addresses, reserved hostnames, and cloud metadata endpoints, it does not validate the final targets of HTTP redirects. Attackers can exploit this by crafting URLs that redirect through allowed external addresses to internal or sensitive endpoints, effectively bypassing all URL validation. Additionally, Docker-specific internal addresses such as host.docker.internal are not blocked, increasing the attack surface in containerized environments. This vulnerability allows attackers to coerce the server into making unauthorized requests to internal services, potentially exposing sensitive information or enabling further attacks. The vulnerability has a CVSS 3.1 base score of 5.9, reflecting medium severity with a high confidentiality impact but no integrity or availability impact. Exploitation requires no authentication or user interaction, but the attack complexity is high due to the need to craft redirect chains. The issue was publicly disclosed and patched in version 0.2.12, with no known exploits in the wild at the time of publication.

Potential Impact

The primary impact of this SSRF vulnerability is unauthorized access to internal network resources from the vulnerable WeKnora server. Attackers can leverage redirect chains to bypass URL validation and access sensitive internal services, including cloud metadata endpoints and Docker internal addresses, which may contain credentials, configuration data, or other sensitive information. This can lead to confidentiality breaches, such as leaking secrets or internal API data. While the vulnerability does not directly affect data integrity or availability, the information gained could facilitate further attacks, including privilege escalation or lateral movement within the network. Organizations deploying WeKnora in containerized or cloud environments are at increased risk due to the exposure of Docker-specific internal addresses. The medium CVSS score reflects moderate risk, but the potential for sensitive data exposure makes this a significant concern for organizations handling confidential or regulated data.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade Tencent WeKnora to version 0.2.12 or later, where the SSRF issue is patched. Beyond upgrading, it is critical to implement strict outbound network egress filtering on servers running WeKnora to restrict access to internal IP ranges and sensitive endpoints, including Docker internal addresses. Network segmentation should be enforced to isolate application servers from critical internal services. Additionally, enhance URL validation logic to verify redirect targets and disallow redirects to private or reserved IP ranges and hostnames. Employ runtime monitoring and logging to detect unusual outbound requests from the application server that may indicate SSRF exploitation attempts. Containerized deployments should ensure that internal Docker hostnames are not accessible or are properly firewalled. Finally, conduct regular security assessments and penetration testing focused on SSRF vectors to identify and remediate similar weaknesses proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-04T17:23:59.799Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69aba2fec48b3f10ff3494bf

Added to database: 3/7/2026, 4:01:02 AM

Last enriched: 3/14/2026, 7:44:30 PM

Last updated: 4/21/2026, 2:09:36 AM

Views: 124

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses