OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Prior to version 1.6.3-alpha, the URL ingest pipeline accepted user-controlled remote URLs with incomplete destination restrictions. Although private/local host checks existed, missing restrictions for credentialed URLs, non-standard ports, and cross-host redirects left SSRF-class abuse paths in non-localhost deployments. This issue has been patched in version 1.6.3-alpha.
References
| Link | Resource |
|---|---|
| https://github.com/OpenSift/OpenSift/commit/1126e0a503876056a68a434e19f64158a5a4840b | Patch |
| https://github.com/OpenSift/OpenSift/commit/de99b9c | Patch |
| https://github.com/OpenSift/OpenSift/pull/67 | Issue Tracking Patch |
| https://github.com/OpenSift/OpenSift/releases/tag/v1.6.3-alpha | Release Notes |
| https://github.com/OpenSift/OpenSift/security/advisories/GHSA-5jfc-p787-2mf9 | Vendor Advisory Patch |
Configurations
History
No history.
Information
Published : 2026-03-06 05:16
Updated : 2026-03-18 12:59
NVD link : CVE-2026-28677
Mitre link : CVE-2026-28677
CVE.ORG link : CVE-2026-28677
JSON object : View
Products Affected
opensift
- opensift
CWE
CWE-918
Server-Side Request Forgery (SSRF)
