CVE-2026-28508
Received Received - Intake
CSRF Bypass in Idno API Enables Server-Side Request Forgery

Publication date: 2026-03-06

Last updated on: 2026-03-16

Assigner: GitHub, Inc.

Description
Idno is a social publishing platform. Prior to version 1.6.4, a logic error in the API authentication flow causes the CSRF protection on the URL unfurl service endpoint to be trivially bypassed by any unauthenticated remote attacker. Combined with the absence of a login requirement on the endpoint itself, this allows an attacker to force the server to make arbitrary outbound HTTP requests to any host, including internal network addresses and cloud instance metadata services, and retrieve the response content. This issue has been patched in version 1.6.4.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-06
Last Modified
2026-03-16
Generated
2026-05-07
AI Q&A
2026-03-06
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
withknown known to 1.6.4 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-28508 is a critical Server-Side Request Forgery (SSRF) vulnerability in the Idno social publishing platform versions prior to 1.6.4. It exists in the URL unfurl service endpoint, where a logic error in the API authentication flow allows unauthenticated remote attackers to bypass CSRF protection.

Specifically, the endpoint intended to be protected is accessible without login, and the CSRF protections can be bypassed because the system prematurely sets an API request flag before verifying credentials. Attackers can exploit this to force the server to make arbitrary HTTP requests to any host, including internal network addresses and cloud metadata services, and retrieve the response content.


How can this vulnerability impact me? :

This vulnerability allows unauthenticated remote attackers to make arbitrary HTTP requests from the vulnerable server to any destination, including internal network hosts and cloud instance metadata services.

  • Exfiltration of sensitive data from cloud metadata services (e.g., AWS IMDSv1, GCP, Azure), potentially exposing credentials and tokens.
  • Internal network reconnaissance by probing hosts and ports that are normally inaccessible externally.
  • Access to internal admin interfaces, databases, caches, and internal APIs that are protected by localhost restrictions.
  • Potential interaction with internal services like Redis or Memcached, which could lead to cache poisoning or data exfiltration.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by testing the URL unfurl service endpoint for unauthorized access and SSRF behavior. Specifically, you can attempt to access the endpoint without authentication and observe if it returns content from internal or external URLs.'}, {'type': 'paragraph', 'content': 'A practical detection method is to use curl commands to send requests to the vulnerable endpoint with crafted headers that bypass CSRF protections.'}, {'type': 'list_item', 'content': "Use curl to send a GET request to the unfurl endpoint with the headers 'X-Requested-With: XMLHttpRequest', 'X-IDNO-USERNAME', and 'X-IDNO-SIGNATURE' set to any non-empty values."}, {'type': 'list_item', 'content': 'Example command: curl -H "X-Requested-With: XMLHttpRequest" -H "X-IDNO-USERNAME: any" -H "X-IDNO-SIGNATURE: any" "http://target/service/web/unfurl?url=http://127.0.0.1"'}, {'type': 'paragraph', 'content': 'If the response contains content from the internal URL (e.g., localhost), it indicates the vulnerability is present.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include applying the patch provided in Idno version 1.6.4 which fixes the authentication logic flaw.

Specifically, the patch moves the setting of the API request flag to occur only after successful HMAC credential verification, preventing CSRF bypass.

Additionally, implement defense-in-depth by blocking private, loopback, and reserved IP address ranges in the unfurl function to prevent SSRF to internal resources.

  • Upgrade Idno to version 1.6.4 or later.
  • Ensure the API authentication flow correctly validates credentials before setting API request flags.
  • Add IP filtering to block requests to internal IP ranges such as 127.0.0.1, 10.0.0.0/8, 169.254.169.254, and other private or reserved addresses.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart