Impact
Rekor is a supply‑chain transparency log. The vulnerability allows an attacker to submit a URL to /api/v1/index/retrieve, which the service fetches via a GET request. Because the request cannot modify state and the response is not returned to the caller, the flaw cannot be used for data exfiltration, but it can be used to probe internal services through blind SSRF.
Affected Systems
Rekor versions 1.4.3 and earlier are affected, all hosted by Sigstore. The vulnerability is fixed starting with version 1.5.0.
Risk and Exploitability
The CVSS base score is 5.3, and the EPSS probability is less than 1 %. The flaw is not listed in the CISA KEV catalog. Exploitation requires network reachability to the Rekor instance and the attacker must provide a URL that the service will request; the internal network can then be enumerated via blind SSRF, with no direct data leakage.
OpenCVE Enrichment
Github GHSA