Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jvxv-2jjp-jxc3 | Lemmy has unauthenticated SSRF via file_type query parameter injection in image endpoint |
Mon, 09 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lemmynet
Lemmynet lemmy |
|
| Vendors & Products |
Lemmynet
Lemmynet lemmy |
Fri, 06 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Lemmy, a link aggregator and forum for the fediverse, is vulnerable to server-side request forgery via a dependency on activitypub_federation, a framework for ActivityPub federation in Rust. Prior to version 0.19.16, the GET /api/v4/image/{filename} endpoint is vulnerable to unauthenticated SSRF through parameter injection in the file_type query parameter. An attacker can inject arbitrary query parameters into the internal request to pict-rs, including the proxy parameter which causes pict-rs to fetch arbitrary URLs. This issue has been patched in version 0.19.16. | |
| Title | Lemmy: Unauthenticated SSRF via file_type query parameter injection in image endpoint | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-06T18:33:08.993Z
Reserved: 2026-03-04T14:44:00.713Z
Link: CVE-2026-29178
Updated: 2026-03-06T18:32:57.675Z
Status : Deferred
Published: 2026-03-06T18:16:20.650
Modified: 2026-04-28T21:11:07.100
Link: CVE-2026-29178
No data.
OpenCVE Enrichment
Updated: 2026-04-16T11:30:15Z
Github GHSA