CVE-2026-8081
Awaiting Analysis Awaiting Analysis - Queue
Server-Side Request Forgery in router-for-me CLIProxyAPI

Publication date: 2026-05-07

Last updated on: 2026-05-07

Assigner: VulDB

Description
A vulnerability has been found in router-for-me CLIProxyAPI 6.9.29. Affected by this issue is some unknown functionality of the file internal/api/handlers/management/api_tools.go of the component API Interface. The manipulation of the argument url leads to server-side request forgery. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-07
Last Modified
2026-05-07
Generated
2026-05-09
AI Q&A
2026-05-07
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-8081 is a Server-Side Request Forgery (SSRF) vulnerability found in the CLIProxyAPI system, specifically in the file internal/api/handlers/management/api_tools.go. The vulnerability arises because the system only performs minimal checks on the URL argument, such as verifying it is not empty, resolvable, and contains a scheme and host. However, it fails to validate whether the host is a private IP, a blacklisted domain, or if the protocol and port are restricted.

This flaw allows an attacker with a valid authorization token to craft HTTP requests with arbitrary methods, headers, and URLs, including overwriting the Host header. By doing so, the attacker can make the server send requests to internal or external systems, potentially probing or interacting with other services.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in CLIProxyAPI allows an attacker with a valid authorization token to perform server-side request forgery (SSRF), potentially leading to unauthorized access or data exfiltration by sending crafted requests to internal or external systems.

Such unauthorized access or data exfiltration could impact compliance with common standards and regulations like GDPR or HIPAA, which require protection of sensitive data and prevention of unauthorized data disclosure.

However, the provided information does not explicitly state the direct effects on compliance or mention specific regulatory impacts.


How can this vulnerability impact me? :

This vulnerability can be exploited remotely by an attacker who has a valid authorization token, allowing them to make the server send crafted HTTP requests to internal or external systems.

  • Unauthorized access to internal services or resources that are not normally exposed.
  • Potential data exfiltration by interacting with internal or external endpoints.
  • Reconnaissance or probing of internal network infrastructure.
  • Manipulation of HTTP headers and methods could lead to further exploitation or bypassing security controls.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for unusual or unauthorized POST requests to the endpoint /v0/management/api-call that include JSON payloads specifying URLs. Specifically, look for requests containing a valid Authorization Bearer token and URLs that may point to internal or external systems.

To detect exploitation attempts, you can search your web server or API logs for POST requests to /v0/management/api-call with JSON bodies containing the "url" parameter.

  • Use command-line tools like grep or jq to filter logs for suspicious API calls, for example:
  • grep 'POST /v0/management/api-call' /var/log/nginx/access.log | grep 'Authorization: Bearer'
  • jq '.url' api_call_logs.json | grep -E 'http://|https://' to extract URLs from logged JSON payloads.

Network monitoring tools can also be configured to alert on outbound requests initiated by the API to unexpected or private IP addresses or domains.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the vulnerable API endpoint /v0/management/api-call to trusted users only, as exploitation requires a valid Authorization Bearer token.

Implement network-level controls to block outgoing requests from the API server to internal or sensitive IP ranges and domains.

Monitor and audit API usage for suspicious or unexpected requests, especially those containing arbitrary URLs or custom headers.

If possible, apply patches or updates from the vendor once available, although the vendor has not responded to the disclosure.

As a temporary workaround, consider disabling or limiting the functionality of the API Interface component that handles the URL argument until a fix is applied.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart