Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xwh2-742g-w3wp | Miniflux Media Proxy SSRF via /proxy endpoint allows access to internal network resources |
Mon, 12 Jan 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Miniflux Project
Miniflux Project miniflux |
|
| CPEs | cpe:2.3:a:miniflux_project:miniflux:*:*:*:*:*:go:*:* | |
| Vendors & Products |
Miniflux Project
Miniflux Project miniflux |
Thu, 08 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 08 Jan 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Miniflux 2 is an open source feed reader. Prior to version 2.2.16, Miniflux's media proxy endpoint (`GET /proxy/{encodedDigest}/{encodedURL}`) can be abused to perform Server-Side Request Forgery (SSRF). An authenticated user can cause Miniflux to generate a signed proxy URL for attacker-chosen media URLs embedded in feed entry content, including internal addresses (e.g., localhost, private RFC1918 ranges, or link-local metadata endpoints). Requesting the resulting `/proxy/...` URL makes Miniflux fetch and return the internal response. Version 2.2.16 fixes the issue. | |
| Title | Miniflux Media Proxy SSRF via /proxy endpoint allows access to internal network resources | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-08T15:55:28.121Z
Reserved: 2026-01-05T17:24:36.928Z
Link: CVE-2026-21885
Updated: 2026-01-08T14:52:37.831Z
Status : Analyzed
Published: 2026-01-08T14:15:57.257
Modified: 2026-01-12T16:55:42.353
Link: CVE-2026-21885
No data.
OpenCVE Enrichment
Updated: 2026-04-18T16:45:05Z
Github GHSA