Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3jvj-v6w2-h948 | Lemmy has SSRF in /api/v3/post via Webmention dispatch |
Wed, 13 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lemmynet
Lemmynet lemmy |
|
| Vendors & Products |
Lemmynet
Lemmynet lemmy |
Fri, 08 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Lemmy is a link aggregator and forum for the fediverse. Prior to version 0.19.18, Lemmy allows an authenticated low-privileged user to create a link post through POST /api/v3/post. When a post is created in a public community, the backend asynchronously sends a Webmention to the attacker-controlled link target. The submitted URL is checked for syntax and scheme, but the audited code path does not reject loopback, private, or link-local destinations before the Webmention request is issued. This lets a normal user trigger server-side HTTP requests toward internal services. This issue has been patched in version 0.19.18. | |
| Title | Lemmy: SSRF in /api/v3/post via Webmention dispatch | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T17:18:23.284Z
Reserved: 2026-04-25T01:53:21.582Z
Link: CVE-2026-42180
Updated: 2026-05-13T17:18:20.309Z
Status : Deferred
Published: 2026-05-08T20:16:31.023
Modified: 2026-05-13T18:16:15.470
Link: CVE-2026-42180
No data.
OpenCVE Enrichment
Updated: 2026-05-08T22:30:18Z
Github GHSA