SocialEngine versions 7.8.0 and prior contain a blind server-side request forgery vulnerability in the /core/link/preview endpoint where user-supplied input passed via the uri request parameter is not sanitized before being used to construct outbound HTTP requests. Authenticated remote attackers can supply arbitrary URLs including internal network addresses and loopback addresses to cause the server to issue HTTP requests to attacker-controlled destinations, enabling internal network enumeration and access to services not intended to be externally reachable.
History

Wed, 29 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
References

Mon, 27 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Socialengine
Socialengine socialengine
CPEs cpe:2.3:a:socialengine:socialengine:*:*:*:*:*:*:*:*
Vendors & Products Socialengine
Socialengine socialengine

Thu, 23 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description SocialEngine versions 7.8.0 and prior contain a blind server-side request forgery vulnerability in the /core/link/preview endpoint where user-supplied input passed via the uri request parameter is not sanitized before being used to construct outbound HTTP requests. Authenticated remote attackers can supply arbitrary URLs including internal network addresses and loopback addresses to cause the server to issue HTTP requests to attacker-controlled destinations, enabling internal network enumeration and access to services not intended to be externally reachable.
Title SocialEngine <= 7.8.0 Blind SSRF via /core/link/preview
Weaknesses CWE-918
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2026-04-23T13:45:07.359Z

Updated: 2026-04-29T19:32:21.152Z

Reserved: 2026-04-20T16:07:47.310Z

Link: CVE-2026-41461

cve-icon Vulnrichment

Updated: 2026-04-29T19:32:21.152Z

cve-icon NVD

Status : Modified

Published: 2026-04-23T15:37:24.683

Modified: 2026-04-29T20:16:30.927

Link: CVE-2026-41461

cve-icon Redhat

No data.