CVE-2026-28680
Received Received - Intake
SSRF Vulnerability in Ghostfolio Asset Import Enables Data Exfiltration

Publication date: 2026-03-06

Last updated on: 2026-03-10

Assigner: GitHub, Inc.

Description
Ghostfolio is an open source wealth management software. Prior to version 2.245.0, an attacker can exploit the manual asset import feature to perform a full-read SSRF, allowing them to exfiltrate sensitive cloud metadata (IMDS) or probe internal network services. This issue has been patched in version 2.245.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-06
Last Modified
2026-03-10
Generated
2026-05-07
AI Q&A
2026-03-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ghostfol ghostfolio to 2.245.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-28680 is a critical Server-Side Request Forgery (SSRF) vulnerability in the Ghostfolio open source wealth management software. It affects versions prior to 2.245.0 and specifically targets the manual asset import feature.

An attacker can exploit this vulnerability to perform a full-read SSRF, which allows them to exfiltrate sensitive cloud metadata such as Instance Metadata Service (IMDS) data or to probe internal network services.

This vulnerability requires no privileges or user interaction and has a high impact on confidentiality, with a CVSS v3.1 base score of 9.3 (Critical). It has been patched in version 2.245.0.


How can this vulnerability impact me? :

This vulnerability can have serious impacts by allowing attackers to access sensitive cloud metadata and internal network services without authorization.

Exfiltration of cloud metadata like IMDS can lead to exposure of credentials, configuration details, or other sensitive information that could be used to further compromise cloud resources.

Additionally, probing internal network services can reveal information about the internal infrastructure, potentially enabling further attacks.

Since the vulnerability requires no privileges or user interaction, it can be exploited remotely and easily, increasing the risk.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

To mitigate the CVE-2026-28680 vulnerability, you should upgrade Ghostfolio to version 2.245.0 or later, where the issue has been patched.

As a workaround, disable public user signup to restrict access to the manual asset import feature to trusted users only.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart