Description
Server-side request forgery (ssrf) in Azure DevOps Server allows an authorized attacker to perform spoofing over a network.
Published: 2026-02-10
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server-Side Request Forgery
Action: Patch ASAP
AI Analysis

Impact

The vulnerability is a server‑side request forgery that allows an authenticated user to force the Azure DevOps Server to send arbitrary HTTP requests to internal network addresses, effectively enabling spoofing of internal services. This flaw, classified as CWE‑918, can be exploited to access or manipulate resources that are normally behind internal firewalls. The ability to trigger external requests from the server gives the attacker potential to exfiltrate data or pivot to other systems, thereby compromising confidentiality and possibly affecting integrity by modifying internal resources.

Affected Systems

Microsoft Azure DevOps Server 2022. No specific patch or version details are listed in the CNA data, so all installations of the 2022 release are potentially vulnerable until updated.

Risk and Exploitability

The CVSS score of 6.5 indicates a moderate severity, and the EPSS score of <1% suggests low current exploitation probability. The issue is not listed in the CISA Known Exploited Vulnerabilities catalog. The attack requires the attacker to be authorized and to supply a crafted request within the server’s processing workflow. Inference: the likely attack vector involves sending a specially crafted URL or payload through an authenticated session that causes the server to issue an outbound request to a target internal host.

Generated by OpenCVE AI on April 15, 2026 at 18:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and install the Microsoft security update that addresses CVE‑2026‑21512 for Azure DevOps Server 2022.
  • Restrict the URLs that Azure DevOps Server can contact by implementing input validation or a whitelist for outbound requests.
  • Configure network segmentation or firewall rules to block outbound traffic from Azure DevOps Server to internal IP ranges that are not required for normal operation.

Generated by OpenCVE AI on April 15, 2026 at 18:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft azure Devops Server
CPEs cpe:2.3:o:microsoft:azure_devops_server:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:azure_devops_server:2022.2.0:-:*:*:*:*:*:*
cpe:2.3:o:microsoft:azure_devops_server:2022.2.0:patch2:*:*:*:*:*:*
cpe:2.3:o:microsoft:azure_devops_server:2022.2.0:patch3:*:*:*:*:*:*
cpe:2.3:o:microsoft:azure_devops_server:2022.2.0:patch4:*:*:*:*:*:*
cpe:2.3:o:microsoft:azure_devops_server:2022.2.0:patch5:*:*:*:*:*:*
cpe:2.3:o:microsoft:azure_devops_server:2022.2.0:patch6:*:*:*:*:*:*
cpe:2.3:o:microsoft:azure_devops_server:2022.2.0:patch7:*:*:*:*:*:*
cpe:2.3:o:microsoft:azure_devops_server:2022.2.0:rc:*:*:*:*:*:*
Vendors & Products Microsoft azure Devops Server

Wed, 11 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Description Server-side request forgery (ssrf) in Azure DevOps Server allows an authorized attacker to perform spoofing over a network.
Title Azure DevOps Server Cross-Site Scripting Vulnerability
First Time appeared Microsoft
Microsoft azure Devops Server 2022
Weaknesses CWE-918
CPEs cpe:2.3:a:microsoft:azure_devops_server_2022:*:-:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft azure Devops Server 2022
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Azure Devops Server Azure Devops Server 2022
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-10T13:21:02.551Z

Reserved: 2025-12-30T18:10:54.845Z

Link: CVE-2026-21512

cve-icon Vulnrichment

Updated: 2026-02-11T15:23:56.634Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-10T18:16:33.493

Modified: 2026-02-11T21:39:50.107

Link: CVE-2026-21512

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T18:45:11Z

Weaknesses