Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 14 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:openobserve:openobserve:*:*:*:*:*:*:*:* |
Thu, 09 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openobserve
Openobserve openobserve |
|
| Vendors & Products |
Openobserve
Openobserve openobserve |
Tue, 07 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenObserve is a cloud-native observability platform. In 0.70.3 and earlier, the validate_enrichment_url function in src/handler/http/request/enrichment_table/mod.rs fails to block IPv6 addresses because Rust's url crate returns them with surrounding brackets (e.g. "[::1]" not "::1"). An authenticated attacker can reach internal services blocked from external access. On cloud deployments this enables retrieval of IAM credentials via AWS IMDSv1 (169.254.169.254), GCP metadata, or Azure IMDS. On self-hosted deployments it allows probing internal network services. | |
| Title | OpenObserve has a SSRF Protection Bypass via IPv6 Bracket Notation in validate_enrichment_url | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-09T16:17:46.139Z
Reserved: 2026-04-06T21:29:17.349Z
Link: CVE-2026-39361
Updated: 2026-04-09T15:04:30.587Z
Status : Analyzed
Published: 2026-04-07T20:16:29.837
Modified: 2026-04-14T20:28:05.760
Link: CVE-2026-39361
No data.
OpenCVE Enrichment
Updated: 2026-04-15T16:15:11Z