Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3c45-4pj5-ch7m | changedetection.io is Vulnerable to SSRF via Watch URLs |
Thu, 26 Feb 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Webtechnologies
Webtechnologies changedetection |
|
| CPEs | cpe:2.3:a:webtechnologies:changedetection:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Webtechnologies
Webtechnologies changedetection |
Thu, 26 Feb 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Feb 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dgtlmoon
Dgtlmoon changedetection.io |
|
| Vendors & Products |
Dgtlmoon
Dgtlmoon changedetection.io |
Wed, 25 Feb 2026 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | changedetection.io is a free open source web page change detection tool. In versions prior to 0.54.1, changedetection.io is vulnerable to Server-Side Request Forgery (SSRF) because the URL validation function `is_safe_valid_url()` does not validate the resolved IP address of watch URLs against private, loopback, or link-local address ranges. An authenticated user (or any user when no password is configured, which is the default) can add a watch for internal network URLs. The application fetches these URLs server-side, stores the response content, and makes it viewable through the web UI — enabling full data exfiltration from internal services. Version 0.54.1 contains a fix for the issue. | |
| Title | changedetection.io Vulnerable to Server-Side Request Forgery (SSRF) via Watch URLs | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-25T14:51:16.695Z
Reserved: 2026-02-23T17:56:51.202Z
Link: CVE-2026-27696
Updated: 2026-02-25T14:51:11.760Z
Status : Analyzed
Published: 2026-02-25T05:17:26.940
Modified: 2026-02-26T15:34:26.273
Link: CVE-2026-27696
No data.
OpenCVE Enrichment
Updated: 2026-04-17T15:30:06Z
Github GHSA