CVE-2026-34428: CWE-918 Server-Side Request Forgery (SSRF) in givanz Vvveb
Vvveb prior to 1.0.8.1 contains a server-side request forgery vulnerability in the oEmbedProxy action of the editor/editor module where the url parameter is passed directly to getUrl() via curl without scheme or destination validation. Authenticated backend users can supply file:// URLs to read arbitrary files readable by the web server process or http:// URLs targeting internal network addresses to probe internal services, with response bodies returned directly to the caller.
AI Analysis
Technical Summary
CVE-2026-34428 is a server-side request forgery vulnerability in the Vvveb product by givanz, affecting versions prior to 1.0.8.1. The issue exists in the oEmbedProxy action within the editor/editor module, where the url parameter is passed directly to the getUrl() function using curl without validating the URL scheme or destination. This allows authenticated backend users to supply file:// URLs to read arbitrary files accessible by the web server process or http:// URLs targeting internal network addresses to probe internal services. The response bodies from these requests are returned directly to the caller, exposing potentially sensitive internal information. The vulnerability is classified under CWE-918 and has a CVSS 4.0 base score of 8.3, indicating high severity. There is no vendor advisory or patch currently available, and the product is not a cloud service.
Potential Impact
Exploitation of this SSRF vulnerability allows authenticated backend users to read arbitrary files on the server that the web process can access, potentially exposing sensitive data. Additionally, attackers can probe internal network services by sending crafted HTTP requests to internal addresses, which may reveal information about internal infrastructure. The direct return of response bodies to the attacker increases the risk of information disclosure. There are no known exploits in the wild at this time.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, restrict backend user access to trusted personnel only and monitor for suspicious activity. Avoid exposing the vulnerable functionality to untrusted users. Implement network-level controls to limit the web server's ability to access internal resources if possible.
CVE-2026-34428: CWE-918 Server-Side Request Forgery (SSRF) in givanz Vvveb
Description
Vvveb prior to 1.0.8.1 contains a server-side request forgery vulnerability in the oEmbedProxy action of the editor/editor module where the url parameter is passed directly to getUrl() via curl without scheme or destination validation. Authenticated backend users can supply file:// URLs to read arbitrary files readable by the web server process or http:// URLs targeting internal network addresses to probe internal services, with response bodies returned directly to the caller.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-34428 is a server-side request forgery vulnerability in the Vvveb product by givanz, affecting versions prior to 1.0.8.1. The issue exists in the oEmbedProxy action within the editor/editor module, where the url parameter is passed directly to the getUrl() function using curl without validating the URL scheme or destination. This allows authenticated backend users to supply file:// URLs to read arbitrary files accessible by the web server process or http:// URLs targeting internal network addresses to probe internal services. The response bodies from these requests are returned directly to the caller, exposing potentially sensitive internal information. The vulnerability is classified under CWE-918 and has a CVSS 4.0 base score of 8.3, indicating high severity. There is no vendor advisory or patch currently available, and the product is not a cloud service.
Potential Impact
Exploitation of this SSRF vulnerability allows authenticated backend users to read arbitrary files on the server that the web process can access, potentially exposing sensitive data. Additionally, attackers can probe internal network services by sending crafted HTTP requests to internal addresses, which may reveal information about internal infrastructure. The direct return of response bodies to the attacker increases the risk of information disclosure. There are no known exploits in the wild at this time.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, restrict backend user access to trusted personnel only and monitor for suspicious activity. Avoid exposing the vulnerable functionality to untrusted users. Implement network-level controls to limit the web server's ability to access internal resources if possible.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-03-27T15:24:06.752Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69e6390b19fe3cd2cd032865
Added to database: 4/20/2026, 2:32:43 PM
Last enriched: 4/20/2026, 2:46:06 PM
Last updated: 4/20/2026, 3:52:13 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.