Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 24 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Papra
Papra papra |
|
| CPEs | cpe:2.3:a:papra:papra:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Papra
Papra papra |
Thu, 09 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Papra-hq
Papra-hq papra |
|
| Vendors & Products |
Papra-hq
Papra-hq papra |
Tue, 07 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Papra is a minimalistic document management and archiving platform. Prior to 26.4.0, the Papra webhook system allows authenticated users to register arbitrary URLs as webhook endpoints with no validation of the destination address. The server makes outbound HTTP POST requests to registered URLs, including localhost, internal network ranges, and cloud provider metadata endpoints, on every document event. This vulnerability is fixed in 26.4.0. | |
| Title | Papra has a Blind Server-Side Request Forgery (SSRF) via Webhook URL | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-09T14:41:13.998Z
Reserved: 2026-04-02T19:25:52.193Z
Link: CVE-2026-35461
Updated: 2026-04-09T14:41:04.916Z
Status : Analyzed
Published: 2026-04-07T15:17:44.047
Modified: 2026-04-24T15:29:00.790
Link: CVE-2026-35461
No data.
OpenCVE Enrichment
Updated: 2026-04-08T19:48:49Z