changedetection.io is a free open source web page change detection tool. In versions prior to 0.54.1, changedetection.io is vulnerable to Server-Side Request Forgery (SSRF) because the URL validation function `is_safe_valid_url()` does not validate the resolved IP address of watch URLs against private, loopback, or link-local address ranges. An authenticated user (or any user when no password is configured, which is the default) can add a watch for internal network URLs. The application fetches these URLs server-side, stores the response content, and makes it viewable through the web UI — enabling full data exfiltration from internal services. Version 0.54.1 contains a fix for the issue.
References
| Link | Resource |
|---|---|
| https://github.com/dgtlmoon/changedetection.io/commit/fe7aa38c651d73fe5f41ce09855fa8f97193747b | Patch |
| https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-3c45-4pj5-ch7m | Exploit Mitigation Vendor Advisory |
| https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-3c45-4pj5-ch7m | Exploit Mitigation Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-02-25 05:17
Updated : 2026-02-26 15:34
NVD link : CVE-2026-27696
Mitre link : CVE-2026-27696
CVE.ORG link : CVE-2026-27696
JSON object : View
Products Affected
webtechnologies
- changedetection
CWE
CWE-918
Server-Side Request Forgery (SSRF)
