CVE-2026-33693: CWE-918: Server-Side Request Forgery (SSRF) in LemmyNet lemmy
CVE-2026-33693 is a Server-Side Request Forgery (SSRF) vulnerability in LemmyNet's lemmy software versions prior to 0. 7. 0-beta. 9. The vulnerability arises because the function v4_is_invalid() in activitypub-federation-rust does not properly check for the IPv4 unspecified address 0. 0. 0. 0, allowing attackers to bypass SSRF protections. An unauthenticated attacker controlling a remote domain can exploit this to make the lemmy server send requests to its own localhost services, potentially accessing internal resources. The issue was introduced as a bypass of protections fixed in a previous CVE (2025-25194).
AI Analysis
Technical Summary
CVE-2026-33693 is a Server-Side Request Forgery (SSRF) vulnerability affecting LemmyNet's lemmy software versions earlier than 0.7.0-beta.9. Lemmy is a federated link aggregator and forum platform that uses the activitypub-federation-rust library for federation functionality. The vulnerability exists in the v4_is_invalid() function within src/utils.rs, which is responsible for validating IPv4 addresses. This function fails to check for the IPv4 unspecified address 0.0.0.0, also known as the 'unspecified' address. Because of this omission, an attacker who controls a remote domain can craft a domain that resolves to 0.0.0.0, thereby bypassing the SSRF protections that were introduced to fix a prior vulnerability (CVE-2025-25194). By exploiting this, the attacker can coerce the lemmy server into sending HTTP requests to its own localhost services, which are typically inaccessible externally. This can lead to unauthorized access to internal services, potentially exposing sensitive data or enabling further attacks within the internal network. The vulnerability requires no authentication or user interaction, making it easier to exploit remotely. The CVSS 3.1 base score is 6.5, reflecting a medium severity with low attack complexity and no privileges required. LemmyNet addressed this vulnerability in version 0.7.0-beta.9 by adding proper validation to reject the 0.0.0.0 address. No public exploits or active exploitation have been reported to date, but the nature of SSRF vulnerabilities means that affected instances exposed to untrusted networks are at risk.
Potential Impact
The primary impact of CVE-2026-33693 is unauthorized internal network access via SSRF, allowing attackers to reach localhost services on the vulnerable lemmy server. This can lead to information disclosure if internal services expose sensitive data or APIs. In some cases, it may enable attackers to perform further attacks such as privilege escalation, lateral movement, or service disruption if internal endpoints are vulnerable. Since the vulnerability requires no authentication or user interaction, any exposed lemmy instance running a vulnerable version is at risk from remote attackers. Organizations using lemmy for federated forums or link aggregation may face confidentiality breaches or service integrity issues. The impact is particularly significant for deployments with sensitive internal services running on localhost or restricted interfaces. Although no known exploits are reported yet, the vulnerability's medium severity and ease of exploitation warrant prompt remediation to prevent potential compromise.
Mitigation Recommendations
Organizations should immediately upgrade all lemmy instances to version 0.7.0-beta.9 or later, where the vulnerability is patched. In addition to upgrading, administrators should audit and restrict network access to internal services running on the lemmy host, especially localhost interfaces, to minimize exposure. Implement network segmentation and firewall rules to prevent the lemmy server from making unauthorized outbound requests to internal services. Monitoring and logging outbound HTTP requests from lemmy can help detect suspicious SSRF attempts. If upgrading is temporarily not possible, consider applying custom patches or disabling federation features that invoke the vulnerable code paths. Regularly review and update dependencies such as activitypub-federation-rust to incorporate security fixes. Finally, conduct internal penetration testing to identify any further SSRF or internal service exposure risks.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Netherlands, Sweden, Japan, Brazil
CVE-2026-33693: CWE-918: Server-Side Request Forgery (SSRF) in LemmyNet lemmy
Description
CVE-2026-33693 is a Server-Side Request Forgery (SSRF) vulnerability in LemmyNet's lemmy software versions prior to 0. 7. 0-beta. 9. The vulnerability arises because the function v4_is_invalid() in activitypub-federation-rust does not properly check for the IPv4 unspecified address 0. 0. 0. 0, allowing attackers to bypass SSRF protections. An unauthenticated attacker controlling a remote domain can exploit this to make the lemmy server send requests to its own localhost services, potentially accessing internal resources. The issue was introduced as a bypass of protections fixed in a previous CVE (2025-25194).
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-33693 is a Server-Side Request Forgery (SSRF) vulnerability affecting LemmyNet's lemmy software versions earlier than 0.7.0-beta.9. Lemmy is a federated link aggregator and forum platform that uses the activitypub-federation-rust library for federation functionality. The vulnerability exists in the v4_is_invalid() function within src/utils.rs, which is responsible for validating IPv4 addresses. This function fails to check for the IPv4 unspecified address 0.0.0.0, also known as the 'unspecified' address. Because of this omission, an attacker who controls a remote domain can craft a domain that resolves to 0.0.0.0, thereby bypassing the SSRF protections that were introduced to fix a prior vulnerability (CVE-2025-25194). By exploiting this, the attacker can coerce the lemmy server into sending HTTP requests to its own localhost services, which are typically inaccessible externally. This can lead to unauthorized access to internal services, potentially exposing sensitive data or enabling further attacks within the internal network. The vulnerability requires no authentication or user interaction, making it easier to exploit remotely. The CVSS 3.1 base score is 6.5, reflecting a medium severity with low attack complexity and no privileges required. LemmyNet addressed this vulnerability in version 0.7.0-beta.9 by adding proper validation to reject the 0.0.0.0 address. No public exploits or active exploitation have been reported to date, but the nature of SSRF vulnerabilities means that affected instances exposed to untrusted networks are at risk.
Potential Impact
The primary impact of CVE-2026-33693 is unauthorized internal network access via SSRF, allowing attackers to reach localhost services on the vulnerable lemmy server. This can lead to information disclosure if internal services expose sensitive data or APIs. In some cases, it may enable attackers to perform further attacks such as privilege escalation, lateral movement, or service disruption if internal endpoints are vulnerable. Since the vulnerability requires no authentication or user interaction, any exposed lemmy instance running a vulnerable version is at risk from remote attackers. Organizations using lemmy for federated forums or link aggregation may face confidentiality breaches or service integrity issues. The impact is particularly significant for deployments with sensitive internal services running on localhost or restricted interfaces. Although no known exploits are reported yet, the vulnerability's medium severity and ease of exploitation warrant prompt remediation to prevent potential compromise.
Mitigation Recommendations
Organizations should immediately upgrade all lemmy instances to version 0.7.0-beta.9 or later, where the vulnerability is patched. In addition to upgrading, administrators should audit and restrict network access to internal services running on the lemmy host, especially localhost interfaces, to minimize exposure. Implement network segmentation and firewall rules to prevent the lemmy server from making unauthorized outbound requests to internal services. Monitoring and logging outbound HTTP requests from lemmy can help detect suspicious SSRF attempts. If upgrading is temporarily not possible, consider applying custom patches or disabling federation features that invoke the vulnerable code paths. Regularly review and update dependencies such as activitypub-federation-rust to incorporate security fixes. Finally, conduct internal penetration testing to identify any further SSRF or internal service exposure risks.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-23T16:34:59.932Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c5d2fe3c064ed76ff4047c
Added to database: 3/27/2026, 12:44:46 AM
Last enriched: 3/27/2026, 1:00:28 AM
Last updated: 3/27/2026, 1:53:47 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.