CVE-2026-44313
Server-Side Request Forgery in Linkwarden
Publication date: 2026-05-09
Last updated on: 2026-05-09
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linkwarden | linkwarden | to 2.13.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-918 | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Server-Side Request Forgery (SSRF) in Linkwarden versions before 2.13.0. It occurs in the fetchTitleAndHeaders function, which allows authenticated users to make arbitrary HTTP requests to internal services. The root cause is insufficient URL validation that only checks if a URL starts with "http://" or "https://" without further checks.
Because of this, attackers can exploit the vulnerability to access internal Docker services, cloud metadata endpoints, and other internal network resources by tricking the server into making requests on their behalf.
How can this vulnerability impact me? :
This vulnerability can have severe impacts including unauthorized access to internal services and sensitive information. In cloud environments such as AWS, GCP, or Azure, attackers can exploit this to access cloud metadata endpoints, potentially stealing credentials.
With stolen credentials, attackers may gain unauthorized access to cloud resources, leading to data breaches, service disruptions, or further compromise of the infrastructure.
The vulnerability has a critical CVSS score of 9.1 due to its low attack complexity, low required privileges (only authenticated users), and high impact on confidentiality, integrity, and availability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this SSRF vulnerability involves monitoring for unusual HTTP requests originating from authenticated users that target internal services, such as internal Docker endpoints, cloud metadata services, or localhost addresses.
Since the vulnerability allows arbitrary HTTP requests via the fetchTitleAndHeaders function, you can look for requests with URLs starting with "http://" or "https://" that access internal IP ranges or metadata endpoints.
Suggested commands to detect potential exploitation attempts include:
- Using network monitoring tools like tcpdump or Wireshark to capture outgoing HTTP requests from the Linkwarden server and filter for internal IP ranges (e.g., 169.254.169.254 for AWS metadata). Example: tcpdump -i eth0 'dst net 169.254.169.254 or dst net 127.0.0.1'
- Checking application logs for HTTP requests made by authenticated users that include suspicious URLs targeting internal services.
- Using curl or wget commands to test if the server can access internal endpoints, e.g., curl http://169.254.169.254/latest/meta-data/ to verify if metadata endpoints are reachable.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade Linkwarden to version 2.13.0 or later, where the SSRF vulnerability has been patched.
Until the upgrade can be applied, restrict access to internal services and metadata endpoints from the Linkwarden server by implementing network-level controls such as firewall rules or security group restrictions.
Additionally, apply strict URL validation to block requests to internal IP ranges, localhost addresses, and cloud metadata endpoints in any custom or interim code handling URL fetching.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The SSRF vulnerability in Linkwarden allows authenticated users to make arbitrary HTTP requests to internal services, potentially leading to unauthorized access to sensitive internal resources and cloud metadata endpoints.
This unauthorized access could result in credential theft and exposure of confidential information, which may lead to violations of data protection regulations such as GDPR and HIPAA that require strict controls over access to personal and sensitive data.
Therefore, if exploited, this vulnerability could compromise the confidentiality and integrity of sensitive data, impacting compliance with standards that mandate protection of such data.