Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-29v9-frvh-c426 | monetr: Server-side request forgery in Lunch Flow link creation and refresh |
Mon, 11 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:monetr:monetr:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Thu, 07 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Monetr
Monetr monetr |
|
| Vendors & Products |
Monetr
Monetr monetr |
Thu, 07 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 07 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | monetr is a budgeting application for recurring expenses. Prior to version 1.12.5, a server-side request forgery (SSRF) vulnerability in monetr's Lunch Flow integration allowed any authenticated user on a self-hosted instance to cause the monetr server to issue HTTP GET requests to arbitrary URLs supplied by the caller, with the response body from non-200 upstream responses reflected back in the API error message. This issue has been patched in version 1.12.5. | |
| Title | monetr is vulnerable to server-side request forgery in Lunch Flow link creation and refresh | |
| Weaknesses | CWE-209 CWE-770 CWE-918 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-07T13:48:06.056Z
Reserved: 2026-04-21T23:58:43.802Z
Link: CVE-2026-41644
Updated: 2026-05-07T13:48:00.872Z
Status : Analyzed
Published: 2026-05-07T12:16:17.810
Modified: 2026-05-11T16:40:30.673
Link: CVE-2026-41644
No data.
OpenCVE Enrichment
Updated: 2026-05-07T15:30:06Z
Github GHSA