Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3958: Server-Side Request Forgery in Woahai321 ListSync

0
Medium
VulnerabilityCVE-2026-3958cvecve-2026-3958
Published: Wed Mar 11 2026 (03/11/2026, 21:32:08 UTC)
Source: CVE Database V5
Vendor/Project: Woahai321
Product: ListSync

Description

CVE-2026-3958 is a server-side request forgery (SSRF) vulnerability in Woahai321 ListSync versions up to 0. 6. 6. It arises from improper handling in the requests. post function within the JSON Handler component, allowing remote attackers to manipulate server requests. The vulnerability requires no user interaction and can be exploited remotely without authentication, potentially enabling attackers to make unauthorized requests from the vulnerable server. Although the exploit has been publicly disclosed, there are no known active exploits in the wild yet. The vendor has been informed but has not issued a patch or response. The CVSS 4. 0 base score is 5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/19/2026, 02:23:15 UTC

Technical Analysis

CVE-2026-3958 is a server-side request forgery vulnerability identified in the Woahai321 ListSync software, specifically affecting versions 0.6.0 through 0.6.6. The flaw exists in the requests.post function call within the list-sync-main/api_server.py file, part of the JSON Handler component. SSRF vulnerabilities allow attackers to induce the server to send crafted HTTP requests to arbitrary destinations, potentially bypassing firewall restrictions and accessing internal services or sensitive data. This vulnerability can be exploited remotely without requiring authentication or user interaction, increasing its risk profile. The vulnerability was responsibly disclosed to the project maintainers, but no patch or official response has been released as of the publication date. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, and low to limited impact on confidentiality, integrity, and availability. While no active exploits have been reported in the wild, the public disclosure of the exploit code increases the likelihood of exploitation attempts. The absence of a patch means organizations must rely on mitigation strategies until an official fix is available.

Potential Impact

The SSRF vulnerability in ListSync can allow attackers to make unauthorized requests from the vulnerable server to internal or external systems. This can lead to several impacts including unauthorized access to internal network resources, bypassing network access controls, and potential information disclosure if internal services respond with sensitive data. Attackers might also use this vulnerability as a pivot point to conduct further attacks within an organization's network. Although the CVSS score is medium, the ease of remote exploitation without authentication elevates the risk, especially in environments where ListSync is exposed to untrusted networks. The vulnerability could disrupt normal operations if exploited to access or manipulate internal services, potentially impacting confidentiality and integrity of data. Organizations relying on ListSync for synchronization tasks may face operational risks and data exposure until the vulnerability is addressed.

Mitigation Recommendations

Since no official patch is currently available, organizations should implement the following mitigations: 1) Restrict network access to the ListSync service, ensuring it is not exposed to untrusted or public networks. 2) Implement strict input validation and sanitization on any user-supplied URLs or parameters that influence requests.post calls to prevent malicious URL injection. 3) Use network segmentation and firewall rules to limit the server's ability to make outbound requests to sensitive internal resources. 4) Monitor and log outbound requests from the ListSync server to detect unusual or unauthorized request patterns. 5) If possible, deploy a web application firewall (WAF) with rules to detect and block SSRF attack patterns targeting ListSync. 6) Consider temporarily disabling or restricting the vulnerable JSON Handler functionality if feasible. 7) Stay alert for vendor updates or patches and plan for immediate deployment once available. 8) Conduct internal security assessments to identify any potential exploitation attempts and review access controls around the affected systems.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-11T12:36:03.541Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b1e5dd2f860ef94384a341

Added to database: 3/11/2026, 9:59:57 PM

Last enriched: 3/19/2026, 2:23:15 AM

Last updated: 4/24/2026, 11:07:32 PM

Views: 97

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses