Homarr is an open-source dashboard. Prior to 1.52.0, a public (unauthenticated) tRPC endpoint widget.app.ping accepts an arbitrary url and performs a server-side request to that URL. This allows an unauthenticated attacker to trigger outbound HTTP requests from the Homarr server, enabling SSRF behavior and a reliable port-scanning primitive (open vs closed ports can be inferred from statusCode vs fetch failed and timing). This vulnerability is fixed in 1.52.0.
References
| Link | Resource |
|---|---|
| https://github.com/homarr-labs/homarr/security/advisories/GHSA-c6rh-8wj4-gv74 | Vendor Advisory |
Configurations
History
18 Feb 2026, 18:08
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References | () https://github.com/homarr-labs/homarr/security/advisories/GHSA-c6rh-8wj4-gv74 - Vendor Advisory | |
| First Time |
Homarr
Homarr homarr |
|
| CPE | cpe:2.3:a:homarr:homarr:*:*:*:*:*:*:*:* |
06 Feb 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-06 22:16
Updated : 2026-02-18 18:08
NVD link : CVE-2026-25123
Mitre link : CVE-2026-25123
CVE.ORG link : CVE-2026-25123
JSON object : View
Products Affected
homarr
- homarr
CWE
CWE-918
Server-Side Request Forgery (SSRF)
