Description
An issue pertaining to CWE-918: Server-Side Request Forgery was discovered in Sunbird-Ed SunbirdEd-portal v1.13.4. This allows attackers to obtain sensitive information
Published: 2026-03-11
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Data Retrieval
Action: Patch
AI Analysis

Impact

A server‑side request forgery flaw in Sunbird‑Ed SunbirdEd‑portal version 1.13.4 allows an attacker to control the URL that the application requests from the network. By supplying an arbitrary URL, the vulnerable code can force the portal to reach internal or external resources, thereby exposing data that should not be publicly accessible. The weakness corresponds to CWE‑918 and results in the disclosure of sensitive information.

Affected Systems

The vulnerability is confined to the Sunbird‑Ed SunbirdEd‑portal product at release 1.13.4. No other vendors or product variants are listed, and the CPE data confirms a single affected instance.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity, while the EPSS score below 1% suggests that exploitation is unlikely at present. The vulnerability is not catalogued in CISA’s Known Exploited Vulnerabilities list. The likely attack path involves an attacker crafting a request containing a malicious URL to activate the SSRF, which would allow data retrieval from the portal’s execution environment. The impact would be limited to the data exposed through the portal’s outbound reach, but it poses a significant confidentiality risk if internal resources can be accessed.

Generated by OpenCVE AI on April 2, 2026 at 15:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Sunbird‑Ed SunbirdEd‑portal to the latest available patch or version that removes the SSRF flaw
  • If a patch is unavailable, restrict the portal’s outbound network traffic to only the required services using firewall or proxy rules
  • Implement URL validation or a strict allow‑list in the application’s request handling to prevent arbitrary outbound requests
  • Continuously monitor application logs for unexpected outbound connections and investigate any anomalies

Generated by OpenCVE AI on April 2, 2026 at 15:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Title SunbirdEd-portal SSRF allows Sensitive Data Retrieval

Thu, 02 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Sunbird
Sunbird sunbirded-portal
CPEs cpe:2.3:a:sunbird:sunbirded-portal:1.13.4:*:*:*:*:*:*:*
Vendors & Products Sunbird
Sunbird sunbirded-portal

Fri, 20 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
Title SunbirdEd-portal SSRF allows Sensitive Data Retrieval

Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Sunbird-ed
Sunbird-ed sunbirded-portal
Vendors & Products Sunbird-ed
Sunbird-ed sunbirded-portal

Wed, 11 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-918
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
Description An issue pertaining to CWE-918: Server-Side Request Forgery was discovered in Sunbird-Ed SunbirdEd-portal v1.13.4. This allows attackers to obtain sensitive information
References

Subscriptions

Sunbird Sunbirded-portal
Sunbird-ed Sunbirded-portal
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-11T14:40:33.327Z

Reserved: 2026-01-09T00:00:00.000Z

Link: CVE-2025-70027

cve-icon Vulnrichment

Updated: 2026-03-11T14:37:46.314Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T15:16:21.507

Modified: 2026-04-02T13:12:23.077

Link: CVE-2025-70027

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:23:54Z

Weaknesses