Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30832: CWE-918: Server-Side Request Forgery (SSRF) in charmbracelet soft-serve

0
Critical
VulnerabilityCVE-2026-30832cvecve-2026-30832cwe-918
Published: Sat Mar 07 2026 (03/07/2026, 15:57:39 UTC)
Source: CVE Database V5
Vendor/Project: charmbracelet
Product: soft-serve

Description

Soft Serve is a self-hostable Git server for the command line. From version 0.6.0 to before version 0.11.4, an authenticated SSH user can force the server to make HTTP requests to internal/private IP addresses by running repo import with a crafted --lfs-endpoint URL. The initial batch request is blind (the response from a metadata endpoint won't parse as valid LFS JSON), but an attacker hosting a fake LFS server can chain this into full read access to internal services by returning download URLs that point at internal targets. This issue has been patched in version 0.11.4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/14/2026, 19:58:32 UTC

Technical Analysis

The vulnerability CVE-2026-30832 in charmbracelet's soft-serve Git server arises from insufficient validation of user-controlled URLs in the Large File Storage (LFS) import functionality. Specifically, authenticated SSH users can supply a crafted --lfs-endpoint URL during the 'repo import' command that causes the server to perform HTTP requests to arbitrary internal or private IP addresses. This SSRF vulnerability (CWE-918) allows attackers to bypass network segmentation and access internal services that are otherwise inaccessible externally. The initial HTTP request made by the server is blind, as the response from the metadata endpoint does not parse as valid LFS JSON, limiting immediate data leakage. However, attackers can host a fake LFS server that returns download URLs pointing to internal resources, enabling chained requests that provide full read access to internal services. This can lead to unauthorized data disclosure and potential further exploitation within the internal network. The vulnerability affects all soft-serve versions from 0.6.0 up to 0.11.4 and requires authenticated SSH access, which limits the attack surface but still poses a significant risk in environments where user credentials are compromised or users are malicious insiders. The issue has been addressed in version 0.11.4 by implementing proper validation and restrictions on the URLs used in the LFS import process. The CVSS v3.1 score of 9.1 reflects the critical nature of this vulnerability, considering its network attack vector, low complexity, required privileges, no user interaction, and the potential for high confidentiality impact with partial integrity and availability impact. No public exploits have been reported yet, but the vulnerability's characteristics make it a high priority for patching.

Potential Impact

This SSRF vulnerability can have severe consequences for organizations using soft-serve as their self-hosted Git server. Attackers with authenticated SSH access can exploit this flaw to access internal services that are typically protected by network segmentation or firewalls, potentially exposing sensitive internal data, configuration files, or credentials. This can lead to lateral movement within the network, further compromise of internal systems, and data breaches. The ability to read internal services undermines confidentiality and can also affect integrity if attackers leverage the access to manipulate internal resources indirectly. Availability may be impacted if internal services are overwhelmed or manipulated through crafted requests. Organizations relying on soft-serve for source code management and internal DevOps workflows face risks of intellectual property theft, disruption of development processes, and exposure of internal infrastructure details. Since the vulnerability requires authenticated SSH access, the risk is heightened in environments with weak access controls, compromised user credentials, or insider threats. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency of remediation given the critical CVSS rating and potential impact.

Mitigation Recommendations

Organizations should immediately upgrade all affected soft-serve instances to version 0.11.4 or later, where the vulnerability has been patched. In addition to patching, organizations should enforce strict SSH access controls, including multi-factor authentication and monitoring of SSH sessions to detect suspicious activities. Network segmentation should be reviewed to limit the ability of internal services to be accessed via the Git server, and outbound HTTP requests from the soft-serve server should be restricted or monitored to detect anomalous behavior. Implementing web application firewalls (WAFs) or intrusion detection systems (IDS) that can identify SSRF patterns may provide additional defense layers. Regular audits of user privileges and repository import operations can help detect misuse. If upgrading immediately is not feasible, consider disabling the LFS import functionality or restricting its use to trusted users only. Logging and alerting on unusual LFS endpoint URLs or unexpected HTTP requests originating from the soft-serve server can aid in early detection of exploitation attempts. Finally, organizations should educate developers and administrators about the risks of SSRF and the importance of applying security updates promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-05T21:06:44.606Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ac4f4bc48b3f10ffae7ac9

Added to database: 3/7/2026, 4:16:11 PM

Last enriched: 3/14/2026, 7:58:32 PM

Last updated: 4/21/2026, 2:48:10 PM

Views: 123

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses