Homarr is an open-source dashboard. Prior to 1.52.0, a public (unauthenticated) tRPC endpoint widget.app.ping accepts an arbitrary url and performs a server-side request to that URL. This allows an unauthenticated attacker to trigger outbound HTTP requests from the Homarr server, enabling SSRF behavior and a reliable port-scanning primitive (open vs closed ports can be inferred from statusCode vs fetch failed and timing). This vulnerability is fixed in 1.52.0.
References
| Link | Resource |
|---|---|
| https://github.com/homarr-labs/homarr/security/advisories/GHSA-c6rh-8wj4-gv74 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-02-06 22:16
Updated : 2026-02-18 18:08
NVD link : CVE-2026-25123
Mitre link : CVE-2026-25123
CVE.ORG link : CVE-2026-25123
JSON object : View
Products Affected
homarr
- homarr
CWE
CWE-918
Server-Side Request Forgery (SSRF)
