Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4907: Server-Side Request Forgery in Page-Replica Page Replica

0
Medium
VulnerabilityCVE-2026-4907cvecve-2026-4907
Published: Fri Mar 27 2026 (03/27/2026, 01:33:14 UTC)
Source: CVE Database V5
Vendor/Project: Page-Replica
Product: Page Replica

Description

A vulnerability was identified in Page-Replica Page Replica up to e4a7f52e75093ee318b4d5a9a9db6751050d2ad0. The impacted element is the function sitemap.fetch of the file /sitemap of the component Endpoint. The manipulation of the argument url leads to server-side request forgery. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 14:47:12 UTC

Technical Analysis

CVE-2026-4907 is a server-side request forgery (SSRF) vulnerability found in the Page-Replica software, affecting the sitemap.fetch function within the /sitemap endpoint of the Endpoint component. The vulnerability arises from improper validation of the 'url' parameter, which an attacker can manipulate to cause the server to send arbitrary HTTP requests to internal or external systems. This can lead to unauthorized access to internal services, bypassing network restrictions, and potentially exposing sensitive data or enabling further attacks such as internal port scanning or exploitation of other internal vulnerabilities. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The product follows a rolling release model, which means affected versions are not clearly delineated, complicating patch management. Despite early vendor notification, no response or patch has been issued, and a public exploit is available, increasing the likelihood of exploitation. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the moderate impact on confidentiality, integrity, and availability, and the ease of exploitation. The vulnerability does not require privileges or user interaction but has limited scope and impact compared to higher severity SSRF flaws. No known exploits in the wild have been reported yet, but the availability of a public exploit raises concern for imminent attacks.

Potential Impact

The SSRF vulnerability in Page-Replica can have significant impacts on organizations running this software. Attackers can leverage the vulnerability to make the server perform unauthorized requests, potentially accessing internal-only services, sensitive metadata, or administrative interfaces not exposed externally. This can lead to information disclosure, such as leaking internal IP addresses, cloud metadata, or confidential data. Additionally, attackers may pivot from SSRF to further compromise internal systems, escalate privileges, or disrupt services. The lack of authentication and user interaction requirements lowers the barrier to exploitation, increasing risk. The rolling release nature of the product complicates patching, potentially leaving many deployments vulnerable for extended periods. Organizations relying on Page-Replica for web infrastructure or content delivery may face data breaches, service interruptions, or reputational damage if exploited. While no active exploitation is reported, the public exploit availability and vendor silence heighten urgency for mitigation.

Mitigation Recommendations

To mitigate CVE-2026-4907, organizations should first implement strict input validation and sanitization on the 'url' parameter in the sitemap.fetch function to prevent arbitrary URL requests. Network-level controls should be enforced to restrict outbound HTTP requests from the Page-Replica server to only trusted destinations, using firewall rules or proxy whitelisting. Employing web application firewalls (WAFs) with custom rules to detect and block suspicious SSRF patterns can provide additional protection. Monitoring and logging all outgoing requests from the server can help detect exploitation attempts early. Given the absence of vendor patches, organizations should consider isolating the Page-Replica service in a segmented network zone with minimal access to sensitive internal resources. Regularly review and update the software to the latest rolling release versions, as future updates may address the vulnerability. If feasible, temporarily disabling or restricting the sitemap.fetch functionality until a patch is available can reduce risk. Finally, maintain awareness of threat intelligence sources for any emerging exploit activity or vendor updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-26T16:01:47.880Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c6949d3c064ed76fb5b813

Added to database: 3/27/2026, 2:30:53 PM

Last enriched: 3/27/2026, 2:47:12 PM

Last updated: 3/27/2026, 11:08:03 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses