CVE-2026-35036
SSRF in Ech0 Link Preview API Allows Server-Side Requests
Publication date: 2026-04-06
Last updated on: 2026-04-14
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ech0 | ech0 | to 4.2.8 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-918 | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-35036 is a high-severity Server-Side Request Forgery (SSRF) vulnerability in the Ech0 open-source publishing platform, affecting all versions prior to 4.2.8.
The vulnerability exists in the unauthenticated GET endpoint /api/website/title, which accepts a fully attacker-controlled URL parameter. The server performs an outbound HTTP(S) GET request to fetch the page title by reading the entire response body into memory without any size limits.
Key issues include no authentication, no host allowlist or SSRF filtering, insecure HTTP client configuration that disables TLS certificate verification (InsecureSkipVerify: true), and automatic following of redirects. This allows attackers to make the server request arbitrary URLs, including internal network addresses, potentially accessing sensitive internal services.
The vulnerability can be exploited to leak internal data, access metadata services, and cause denial of service by forcing the server to read large responses.
How can this vulnerability impact me? :
This vulnerability can have several impacts:
- Attackers can perform SSRF to access internal or restricted network resources from the serverβs perspective.
- Potential unauthorized data leakage from internal services, including sensitive metadata endpoints.
- Possible Denial of Service (DoS) by forcing the server to read very large HTTP responses into memory.
- TLS verification bypass increases the risk of man-in-the-middle attacks on internal HTTPS services.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by testing the unauthenticated GET endpoint /api/website/title on the Ech0 server to see if it accepts arbitrary URLs and fetches their content.
A simple detection method is to send a request to the endpoint with a controlled URL parameter and observe if the server returns the page title from that URL.
Example command using curl to test the vulnerability:
- curl -G 'http://<ech0-server>/api/website/title' --data-urlencode 'website_url=http://example.com'
If the server responds with the title of the example.com page, it indicates the vulnerability is present.
Further detection can include testing access to internal or localhost URLs (e.g., http://169.254.169.254 or http://localhost) to check for SSRF exploitation.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows attackers to perform unauthenticated Server-Side Request Forgery (SSRF) to access internal or restricted network resources from the serverβs perspective, potentially leading to unauthorized data access.
This unauthorized data access could result in data leakage from internal services, which may include sensitive or personal information.
Such data leakage risks could negatively impact compliance with data protection regulations like GDPR and HIPAA, which require safeguarding personal and sensitive data against unauthorized access.
Additionally, the vulnerabilityβs TLS verification bypass increases the risk of man-in-the-middle attacks on internal HTTPS services, further compromising data confidentiality.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include:
- Upgrade Ech0 to version 4.2.8 or later where this vulnerability is fixed.
- If upgrading is not immediately possible, restrict network access to the Ech0 instance to trusted users only.
- Implement network-level egress restrictions to prevent the Ech0 server from making arbitrary outbound HTTP/HTTPS requests.
- Apply firewall rules or host allowlists to block requests to internal, link-local, metadata, and loopback addresses.
- Disable or limit HTTP redirect following in the application if possible.
- Remove or disable the InsecureSkipVerify setting to enforce proper TLS certificate validation.
- Implement response size and timeout limits on outbound requests to mitigate potential Denial of Service attacks.