Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Prior to version 0.16.3, the /ffprobe endpoint accepts arbitrary user-controlled URLs without proper validation, allowing Server-Side Request Forgery (SSRF) attacks. An attacker can use the Frigate server to make HTTP requests to internal network resources, cloud metadata services, or perform port scanning. This issue has been patched in version 0.16.3.
References
| Link | Resource |
|---|---|
| https://github.com/blakeblackshear/frigate/releases/tag/v0.16.3 | Product Release Notes |
| https://github.com/blakeblackshear/frigate/security/advisories/GHSA-j6g3-3j3q-c2xv | Exploit Mitigation Vendor Advisory |
Configurations
History
23 Mar 2026, 19:17
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Frigate frigate
Frigate |
|
| CPE | cpe:2.3:a:frigate:frigate:*:*:*:*:*:*:*:* | |
| References | () https://github.com/blakeblackshear/frigate/releases/tag/v0.16.3 - Product, Release Notes | |
| References | () https://github.com/blakeblackshear/frigate/security/advisories/GHSA-j6g3-3j3q-c2xv - Exploit, Mitigation, Vendor Advisory |
20 Mar 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-20 20:16
Updated : 2026-03-23 19:17
NVD link : CVE-2026-33126
Mitre link : CVE-2026-33126
CVE.ORG link : CVE-2026-33126
JSON object : View
Products Affected
frigate
- frigate
CWE
CWE-918
Server-Side Request Forgery (SSRF)
