CVE-2026-3189: Server-Side Request Forgery in feiyuchuixue sz-boot-parent
A weakness has been identified in feiyuchuixue sz-boot-parent up to 1.3.2-beta. This vulnerability affects unknown code of the file /api/admin/common/files/download. Executing a manipulation of the argument url can lead to server-side request forgery. The attack can be executed remotely. Attacks of this nature are highly complex. It is stated that the exploitability is difficult. Upgrading to version 1.3.3-beta is able to resolve this issue. This patch is called aefaabfd7527188bfba3c8c9eee17c316d094802. Upgrading the affected component is advised. The project was informed beforehand and acted very professional: "We have added a URL protocol whitelist validation to the file download interface, allowing only http and https protocols."
AI Analysis
Technical Summary
CVE-2026-3189 identifies a server-side request forgery (SSRF) vulnerability in the feiyuchuixue sz-boot-parent software, specifically affecting versions up to 1.3.2-beta. The vulnerability exists in the /api/admin/common/files/download endpoint, where the 'url' parameter is insufficiently validated, allowing an attacker to craft requests that cause the server to make unintended HTTP or HTTPS requests to arbitrary locations. SSRF vulnerabilities can be leveraged to access internal systems, bypass firewalls, or perform reconnaissance on internal networks. However, in this case, the exploitability is rated as difficult due to the complexity of crafting a successful attack and the requirement for low-level privileges (PR:L). The vendor responded professionally by releasing version 1.3.3-beta, which introduces a URL protocol whitelist that restricts allowed protocols to http and https, effectively mitigating the vulnerability. The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:N, VA:N). No known exploits have been reported in the wild, and the vulnerability was responsibly disclosed and patched promptly.
Potential Impact
The primary impact of this SSRF vulnerability is the potential for attackers to make unauthorized requests from the vulnerable server to internal or external systems. This can lead to information disclosure about internal network infrastructure or access to otherwise inaccessible resources. However, the impact is limited by the high complexity of exploitation and the vendor's mitigation measures. Since the vulnerability requires low privileges and no user interaction, it could be leveraged by authenticated users with limited access, potentially elevating their ability to perform reconnaissance or pivot attacks. The low CVSS score reflects the limited confidentiality, integrity, and availability impacts. Organizations running affected versions may face risks of internal network exposure or indirect attacks on internal services if the vulnerability is exploited. However, no direct code execution or data modification is indicated, limiting the severity of the threat.
Mitigation Recommendations
Organizations should upgrade feiyuchuixue sz-boot-parent to version 1.3.3-beta or later, which includes a patch enforcing a strict URL protocol whitelist allowing only http and https protocols. Until the upgrade can be applied, administrators should implement network-level controls to restrict outbound HTTP/HTTPS requests from the application server to only trusted destinations. Additionally, review and restrict access to the /api/admin/common/files/download endpoint to trusted and authenticated users only. Employ application-layer firewalls or web application firewalls (WAFs) to detect and block suspicious SSRF patterns targeting the vulnerable parameter. Conduct thorough logging and monitoring of outbound requests from the server to detect anomalous behavior indicative of SSRF exploitation attempts. Finally, perform regular security assessments and code reviews to identify and remediate similar input validation weaknesses.
Affected Countries
China, United States, India, Germany, Japan, South Korea, Brazil, Russia, United Kingdom, France
CVE-2026-3189: Server-Side Request Forgery in feiyuchuixue sz-boot-parent
Description
A weakness has been identified in feiyuchuixue sz-boot-parent up to 1.3.2-beta. This vulnerability affects unknown code of the file /api/admin/common/files/download. Executing a manipulation of the argument url can lead to server-side request forgery. The attack can be executed remotely. Attacks of this nature are highly complex. It is stated that the exploitability is difficult. Upgrading to version 1.3.3-beta is able to resolve this issue. This patch is called aefaabfd7527188bfba3c8c9eee17c316d094802. Upgrading the affected component is advised. The project was informed beforehand and acted very professional: "We have added a URL protocol whitelist validation to the file download interface, allowing only http and https protocols."
AI-Powered Analysis
Technical Analysis
CVE-2026-3189 identifies a server-side request forgery (SSRF) vulnerability in the feiyuchuixue sz-boot-parent software, specifically affecting versions up to 1.3.2-beta. The vulnerability exists in the /api/admin/common/files/download endpoint, where the 'url' parameter is insufficiently validated, allowing an attacker to craft requests that cause the server to make unintended HTTP or HTTPS requests to arbitrary locations. SSRF vulnerabilities can be leveraged to access internal systems, bypass firewalls, or perform reconnaissance on internal networks. However, in this case, the exploitability is rated as difficult due to the complexity of crafting a successful attack and the requirement for low-level privileges (PR:L). The vendor responded professionally by releasing version 1.3.3-beta, which introduces a URL protocol whitelist that restricts allowed protocols to http and https, effectively mitigating the vulnerability. The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:N, VA:N). No known exploits have been reported in the wild, and the vulnerability was responsibly disclosed and patched promptly.
Potential Impact
The primary impact of this SSRF vulnerability is the potential for attackers to make unauthorized requests from the vulnerable server to internal or external systems. This can lead to information disclosure about internal network infrastructure or access to otherwise inaccessible resources. However, the impact is limited by the high complexity of exploitation and the vendor's mitigation measures. Since the vulnerability requires low privileges and no user interaction, it could be leveraged by authenticated users with limited access, potentially elevating their ability to perform reconnaissance or pivot attacks. The low CVSS score reflects the limited confidentiality, integrity, and availability impacts. Organizations running affected versions may face risks of internal network exposure or indirect attacks on internal services if the vulnerability is exploited. However, no direct code execution or data modification is indicated, limiting the severity of the threat.
Mitigation Recommendations
Organizations should upgrade feiyuchuixue sz-boot-parent to version 1.3.3-beta or later, which includes a patch enforcing a strict URL protocol whitelist allowing only http and https protocols. Until the upgrade can be applied, administrators should implement network-level controls to restrict outbound HTTP/HTTPS requests from the application server to only trusted destinations. Additionally, review and restrict access to the /api/admin/common/files/download endpoint to trusted and authenticated users only. Employ application-layer firewalls or web application firewalls (WAFs) to detect and block suspicious SSRF patterns targeting the vulnerable parameter. Conduct thorough logging and monitoring of outbound requests from the server to detect anomalous behavior indicative of SSRF exploitation attempts. Finally, perform regular security assessments and code reviews to identify and remediate similar input validation weaknesses.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-25T08:32:16.087Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699f5e7eb7ef31ef0b4e9b52
Added to database: 2/25/2026, 8:41:34 PM
Last enriched: 2/25/2026, 8:56:16 PM
Last updated: 2/25/2026, 10:25:11 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2694: CWE-285 Improper Authorization in stellarwp The Events Calendar
MediumCVE-2026-27116: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in go-vikunja vikunja
MediumCVE-2026-26985: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in aces Loris
HighCVE-2026-27819: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in go-vikunja vikunja
HighCVE-2026-27616: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in go-vikunja vikunja
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.