Idno is a social publishing platform. Prior to version 1.6.4, a logic error in the API authentication flow causes the CSRF protection on the URL unfurl service endpoint to be trivially bypassed by any unauthenticated remote attacker. Combined with the absence of a login requirement on the endpoint itself, this allows an attacker to force the server to make arbitrary outbound HTTP requests to any host, including internal network addresses and cloud instance metadata services, and retrieve the response content. This issue has been patched in version 1.6.4.
References
| Link | Resource |
|---|---|
| https://github.com/idno/idno/releases/tag/1.6.4 | Product Release Notes |
| https://github.com/idno/idno/security/advisories/GHSA-fcrh-fqxh-6fx6 | Exploit Mitigation Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-06 05:16
Updated : 2026-03-16 14:03
NVD link : CVE-2026-28508
Mitre link : CVE-2026-28508
CVE.ORG link : CVE-2026-28508
JSON object : View
Products Affected
withknown
- known
CWE
CWE-918
Server-Side Request Forgery (SSRF)
