CVE-2026-27696: Schwachstelle in der Open-Source-Monitoring-App changedetection.io

⚠️ CVE-Referenzen: CVE-2026-27696

Zusammenfassung

In älteren Versionen von changedetection.io, einer kostenlosen Open-Source-Web-Monitoring-Anwendung, besteht eine Server-Side Request Forgery (SSRF)-Lücke. Authentifizierte Nutzer können interne Netzwerk-URLs überwachen, was zur Exfiltration sensibler Daten führen kann. Der Patch in Version 0.54.1 behebt dieses kritische Sicherheitsproblem.

changedetection.io is a free open source web page change detection tool. In versions prior to 0.54.1, changedetection.io is vulnerable to Server-Side Request Forgery (SSRF) because the URL validation function `is_safe_valid_url()` does not validate the resolved IP address of watch URLs against private, loopback, or link-local address ranges. An authenticated user (or any user when no password is configured, which is the default) can add a watch for internal network URLs. The application fetches these URLs server-side, stores the response content, and makes it viewable through the web UI — enabling full data exfiltration from internal services. Version 0.54.1 contains a fix for the issue.
Quelle: app.opencve.io