CVE-2026-3048
Received Received - Intake
LDAP Server-Side Request Forgery in Sonatype Nexus Repository Manager

Publication date: 2026-05-11

Last updated on: 2026-05-11

Assigner: Sonatype

Description
An authenticated administrator who configures or tests LDAP connectivity in Sonatype Nexus Repository Manager versions 3.0.0 through 3.91.1 may be able to initiate unintended server-side connections when interacting with a malicious LDAP server.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-11
Last Modified
2026-05-11
Generated
2026-05-11
AI Q&A
2026-05-11
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sonatype nexus_repository_manager to 3.91.1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-3048 is a vulnerability in Sonatype Nexus Repository Manager versions 3.0.0 through 3.91.1 where an authenticated administrator configuring or testing LDAP connectivity may be tricked into initiating unintended server-side connections to a malicious LDAP server.

This happens due to improper handling of LDAP referrals, allowing the server to connect to attacker-controlled LDAP servers when an administrator interacts with LDAP settings.


How can this vulnerability impact me? :

The vulnerability can lead to unintended outbound connections from the Nexus Repository Manager server to malicious LDAP servers controlled by an attacker.

This could potentially expose internal network information or allow attackers to influence server behavior through these connections.

However, exploitation requires administrative access to LDAP settings and interaction with a malicious LDAP server.

Mitigations include upgrading to version 3.92.0, applying configuration workarounds, restricting LDAP configuration access to trusted administrators, and limiting network access to the management interface.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves monitoring for unintended outbound LDAP connections initiated by the Sonatype Nexus Repository Manager when an administrator configures or tests LDAP connectivity.

Since the vulnerability allows the server to make unintended server-side connections to a malicious LDAP server, network monitoring tools can be used to detect unusual LDAP traffic originating from the Nexus server.

Specific commands are not provided in the available resources.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading Sonatype Nexus Repository Manager to version 3.92.0 or later, where the vulnerability is fixed.

If upgrading immediately is not possible, add the property `nexus.ldap.env.java.naming.referral=ignore` to the `nexus.properties` file and restart the server to work around the issue.

  • Restrict LDAP configuration access to trusted administrators only.
  • Limit network access to the management interface to reduce exposure.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an authenticated administrator to initiate unintended server-side connections to a malicious LDAP server when configuring or testing LDAP connectivity. This could potentially lead to unauthorized outbound connections from the server.

While the CVE description and resources do not explicitly mention compliance impacts with standards such as GDPR or HIPAA, the risk of unauthorized connections could imply potential exposure of sensitive information or unauthorized data transmission, which may affect compliance with data protection regulations.

Mitigations include restricting LDAP configuration access to trusted administrators and limiting network access to the management interface, which are important controls to maintain compliance with security best practices required by such standards.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart