CVE-2026-3270: Server-Side Request Forgery in psi-probe PSI Probe
A vulnerability has been found in psi-probe PSI Probe up to 5.3.0. This affects the function lookup of the file psi-probe-core/src/main/java/psiprobe/tools/Whois.java of the component Whois. The manipulation leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2026-3270 is a server-side request forgery vulnerability affecting PSI Probe, an open-source monitoring tool for Apache Tomcat servers, specifically versions 5.0 through 5.3.0. The vulnerability resides in the Whois component's lookup function, located in psi-probe-core/src/main/java/psiprobe/tools/Whois.java. SSRF occurs when the application accepts user-controlled input to perform network requests without proper validation or sanitization, allowing attackers to coerce the server into making arbitrary HTTP requests. This can lead to unauthorized internal network scanning, access to sensitive internal resources, or interaction with external malicious endpoints. The vulnerability can be triggered remotely without user interaction but requires low-level privileges on the system, which may be achievable through other means or misconfigurations. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required (PR:L means low privileges), no user interaction, and low impact on confidentiality, integrity, and availability. The vendor has not responded to the vulnerability disclosure, and no patches have been released, increasing the risk for organizations relying on PSI Probe. While no active exploitation has been reported, the public disclosure of the exploit details raises the likelihood of future attacks. PSI Probe is widely used in environments monitoring Tomcat servers, making this vulnerability relevant for many enterprise and cloud deployments.
Potential Impact
The SSRF vulnerability allows attackers to make the PSI Probe server send crafted requests to internal or external systems, potentially bypassing firewall restrictions and accessing sensitive internal services that are not directly exposed. This can lead to information disclosure, internal network reconnaissance, and possibly pivoting to further attacks within the network. Although the impact on confidentiality, integrity, and availability is rated low to medium, the ability to abuse internal trust boundaries can facilitate more severe attacks, especially in complex enterprise environments. Organizations using PSI Probe in critical infrastructure or cloud environments may face increased risk of lateral movement or data leakage. The lack of vendor response and patches increases exposure time, elevating the threat level. The medium CVSS score reflects moderate risk but should not be underestimated given the potential for chained exploits.
Mitigation Recommendations
Organizations should immediately audit their PSI Probe installations and restrict access to the Whois lookup functionality, ideally limiting it to trusted administrators only. Network segmentation should be enforced to prevent PSI Probe servers from initiating arbitrary outbound requests to sensitive internal systems. Employ web application firewalls (WAFs) or network-level controls to detect and block suspicious SSRF patterns targeting PSI Probe endpoints. If possible, disable or remove the Whois component until a patch is available. Monitor logs for unusual outbound requests originating from PSI Probe servers. Consider deploying runtime application self-protection (RASP) solutions to detect SSRF attempts in real-time. Since no official patch exists, organizations should follow vendor communications closely and apply updates promptly once available. Additionally, implement strict input validation and sanitization on any user-controlled inputs related to network requests within PSI Probe or custom integrations.
Affected Countries
United States, Germany, United Kingdom, France, Japan, India, Australia, Canada, Netherlands, Brazil
CVE-2026-3270: Server-Side Request Forgery in psi-probe PSI Probe
Description
A vulnerability has been found in psi-probe PSI Probe up to 5.3.0. This affects the function lookup of the file psi-probe-core/src/main/java/psiprobe/tools/Whois.java of the component Whois. The manipulation leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-3270 is a server-side request forgery vulnerability affecting PSI Probe, an open-source monitoring tool for Apache Tomcat servers, specifically versions 5.0 through 5.3.0. The vulnerability resides in the Whois component's lookup function, located in psi-probe-core/src/main/java/psiprobe/tools/Whois.java. SSRF occurs when the application accepts user-controlled input to perform network requests without proper validation or sanitization, allowing attackers to coerce the server into making arbitrary HTTP requests. This can lead to unauthorized internal network scanning, access to sensitive internal resources, or interaction with external malicious endpoints. The vulnerability can be triggered remotely without user interaction but requires low-level privileges on the system, which may be achievable through other means or misconfigurations. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required (PR:L means low privileges), no user interaction, and low impact on confidentiality, integrity, and availability. The vendor has not responded to the vulnerability disclosure, and no patches have been released, increasing the risk for organizations relying on PSI Probe. While no active exploitation has been reported, the public disclosure of the exploit details raises the likelihood of future attacks. PSI Probe is widely used in environments monitoring Tomcat servers, making this vulnerability relevant for many enterprise and cloud deployments.
Potential Impact
The SSRF vulnerability allows attackers to make the PSI Probe server send crafted requests to internal or external systems, potentially bypassing firewall restrictions and accessing sensitive internal services that are not directly exposed. This can lead to information disclosure, internal network reconnaissance, and possibly pivoting to further attacks within the network. Although the impact on confidentiality, integrity, and availability is rated low to medium, the ability to abuse internal trust boundaries can facilitate more severe attacks, especially in complex enterprise environments. Organizations using PSI Probe in critical infrastructure or cloud environments may face increased risk of lateral movement or data leakage. The lack of vendor response and patches increases exposure time, elevating the threat level. The medium CVSS score reflects moderate risk but should not be underestimated given the potential for chained exploits.
Mitigation Recommendations
Organizations should immediately audit their PSI Probe installations and restrict access to the Whois lookup functionality, ideally limiting it to trusted administrators only. Network segmentation should be enforced to prevent PSI Probe servers from initiating arbitrary outbound requests to sensitive internal systems. Employ web application firewalls (WAFs) or network-level controls to detect and block suspicious SSRF patterns targeting PSI Probe endpoints. If possible, disable or remove the Whois component until a patch is available. Monitor logs for unusual outbound requests originating from PSI Probe servers. Consider deploying runtime application self-protection (RASP) solutions to detect SSRF attempts in real-time. Since no official patch exists, organizations should follow vendor communications closely and apply updates promptly once available. Additionally, implement strict input validation and sanitization on any user-controlled inputs related to network requests within PSI Probe or custom integrations.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-26T15:13:42.721Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a0dd9b32ffcdb8a288c779
Added to database: 2/26/2026, 11:56:11 PM
Last enriched: 2/27/2026, 12:12:42 AM
Last updated: 4/12/2026, 11:42:59 AM
Views: 64
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.