Description
GeoNode versions 4.0 before 4.4.5 and 5.0 before 5.0.2 contain a server-side request forgery vulnerability that allows authenticated users with document upload permissions to trigger arbitrary outbound HTTP requests by providing a malicious URL via the doc_url parameter during document upload. Attackers can supply URLs pointing to internal network targets, loopback addresses, RFC1918 addresses, or cloud metadata services to cause the server to make requests to internal resources without SSRF mitigations such as private IP filtering or redirect validation.
Published: 2026-04-10
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authenticated internal SSRF allowing outbound HTTP requests to internal resources
Action: Immediate Patch
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 01:15:00 +0000


Wed, 15 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Geosolutionsgroup
Geosolutionsgroup geonode
CPEs cpe:2.3:a:geosolutionsgroup:geonode:*:*:*:*:*:*:*:*
Vendors & Products Geosolutionsgroup
Geosolutionsgroup geonode
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}


Mon, 13 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Geonode
Geonode geonode
Vendors & Products Geonode
Geonode geonode

Fri, 10 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Description GeoNode versions 4.0 before 4.4.5 and 5.0 before 5.0.2 contain a server-side request forgery vulnerability that allows authenticated users with document upload permissions to trigger arbitrary outbound HTTP requests by providing a malicious URL via the doc_url parameter during document upload. Attackers can supply URLs pointing to internal network targets, loopback addresses, RFC1918 addresses, or cloud metadata services to cause the server to make requests to internal resources without SSRF mitigations such as private IP filtering or redirect validation.
Title GeoNode < 4.4.5, 5.0.2 SSRF via Document Upload
Weaknesses CWE-918
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:L'}


Subscriptions

Geonode Geonode
Geosolutionsgroup Geonode
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-08T14:08:23.599Z

Reserved: 2026-04-07T20:57:06.210Z

Link: CVE-2026-39921

cve-icon Vulnrichment

Updated: 2026-04-13T12:29:45.449Z

cve-icon NVD

Status : Modified

Published: 2026-04-10T20:16:22.083

Modified: 2026-04-16T01:16:09.877

Link: CVE-2026-39921

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:57:24Z

Weaknesses