Ghostfolio is an open source wealth management software. Prior to version 2.245.0, an attacker can exploit the manual asset import feature to perform a full-read SSRF, allowing them to exfiltrate sensitive cloud metadata (IMDS) or probe internal network services. This issue has been patched in version 2.245.0.
References
| Link | Resource |
|---|---|
| https://github.com/ghostfolio/ghostfolio/releases/tag/2.245.0 | Product Release Notes |
| https://github.com/ghostfolio/ghostfolio/security/advisories/GHSA-hhv6-c34h-pwgh | Mitigation Patch Vendor Advisory |
Configurations
History
10 Mar 2026, 19:53
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Ghostfol
Ghostfol ghostfolio |
|
| References | () https://github.com/ghostfolio/ghostfolio/releases/tag/2.245.0 - Product, Release Notes | |
| References | () https://github.com/ghostfolio/ghostfolio/security/advisories/GHSA-hhv6-c34h-pwgh - Mitigation, Patch, Vendor Advisory | |
| CPE | cpe:2.3:a:ghostfol:ghostfolio:*:*:*:*:*:*:*:* |
09 Mar 2026, 13:36
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
06 Mar 2026, 05:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-06 05:16
Updated : 2026-03-10 19:53
NVD link : CVE-2026-28680
Mitre link : CVE-2026-28680
CVE.ORG link : CVE-2026-28680
JSON object : View
Products Affected
ghostfol
- ghostfolio
CWE
CWE-918
Server-Side Request Forgery (SSRF)
