Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-fqph-j6v6-jvgx | docling-graph has SSRF via Missing Internal IP Validation in URLInputHandler |
Thu, 14 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Docling-Graph turns documents into validated Pydantic objects, then builds a directed knowledge graph with explicit semantic relationships. Prior to 1.5.1, the URLInputHandler class in docling_graph/core/input/handlers.py makes HTTP requests to user-supplied URLs without validating whether the target resolves to a private, loopback, or link-local IP address. The URLValidator only checks for a valid scheme and non-empty netloc, performing no IP-level validation. Additionally, requests.head() was called with allow_redirects=True, allowing an attacker to redirect requests to internal endpoints via an intermediary URL. An attacker who can control the --source CLI argument or PipelineConfig.source API parameter can trigger Server-Side Request Forgery (SSRF). This vulnerability is fixed in 1.5.1. | |
| Title | Docling-Graph: SSRF via Missing Internal IP Validation in URLInputHandler | |
| Weaknesses | CWE-601 CWE-918 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T18:08:05.223Z
Reserved: 2026-05-06T19:38:10.565Z
Link: CVE-2026-44520
Updated: 2026-05-14T18:05:50.327Z
Status : Deferred
Published: 2026-05-14T18:16:50.010
Modified: 2026-05-14T18:27:25.110
Link: CVE-2026-44520
No data.
OpenCVE Enrichment
Updated: 2026-05-14T18:30:26Z
Github GHSA