CVE-2026-41461

SocialEngine versions 7.8.0 and prior contain a blind server-side request forgery vulnerability in the /core/link/preview endpoint where user-supplied input passed via the uri request parameter is not sanitized before being used to construct outbound HTTP requests. Authenticated remote attackers can supply arbitrary URLs including internal network addresses and loopback addresses to cause the server to issue HTTP requests to attacker-controlled destinations, enabling internal network enumeration and access to services not intended to be externally reachable.
Configurations

Configuration 1 (hide)

cpe:2.3:a:socialengine:socialengine:*:*:*:*:*:*:*:*

History

29 Apr 2026, 20:16

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2026/Apr/11 -

27 Apr 2026, 14:53

Type Values Removed Values Added
References () https://karmainsecurity.com/KIS-2026-07 - () https://karmainsecurity.com/KIS-2026-07 - Third Party Advisory
References () https://socialengine.com - () https://socialengine.com - Product
References () https://www.vulncheck.com/advisories/socialengine-blind-ssrf-via-core-link-preview - () https://www.vulncheck.com/advisories/socialengine-blind-ssrf-via-core-link-preview - Third Party Advisory
CPE cpe:2.3:a:socialengine:socialengine:*:*:*:*:*:*:*:*
First Time Socialengine
Socialengine socialengine

23 Apr 2026, 18:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.5

23 Apr 2026, 15:37

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-23 15:37

Updated : 2026-04-29 20:16


NVD link : CVE-2026-41461

Mitre link : CVE-2026-41461

CVE.ORG link : CVE-2026-41461


JSON object : View

Products Affected

socialengine

  • socialengine
CWE
CWE-918

Server-Side Request Forgery (SSRF)