Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mosparo
Mosparo mosparo |
|
| Vendors & Products |
Mosparo
Mosparo mosparo |
Tue, 12 May 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | mosparo is the modern solution to protect your online forms from spam. Prior to 1.4.13, the automatic rule package source URL feature allows a project member with the editor role to store an attacker-controlled URL that the server later fetches. Because the server follows http/https redirects and does not restrict private or loopback destinations, this becomes a stored SSRF primitive that can be turned into an internal HTTP probing oracle. This vulnerability is fixed in 1.4.13. | |
| Title | mosparo: Rule package source URL stored SSRF enables internal HTTP probing | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-12T21:24:35.643Z
Reserved: 2026-04-18T02:51:52.973Z
Link: CVE-2026-41195
No data.
Status : Deferred
Published: 2026-05-12T22:16:34.050
Modified: 2026-05-13T18:15:26.870
Link: CVE-2026-41195
No data.
OpenCVE Enrichment
Updated: 2026-05-13T00:15:27Z