Description
Homarr is an open-source dashboard. Prior to version 1.54.0, the integration.all tRPC endpoint in Homarr is exposed as a publicProcedure, allowing unauthenticated users to retrieve a complete list of configured integrations. This metadata includes sensitive information such as internal service URLs, integration names, and service types. This issue has been patched in version 1.54.0.
Published: 2026-03-07
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Patch
AI Analysis

Impact

This vulnerability arises from the homarr‑labs homarr integration.all tRPC endpoint being exposed as a publicProcedure before version 1.54.0. Unauthenticated users can call this endpoint and obtain a comprehensive list of configured integrations, which includes internal service URLs, integration names, and service types. The exposure represents a confidentiality breach in line with CWE‑200 and a missing authorization failure consistent with CWE‑862, potentially allowing attackers to discover sensitive infrastructure details.

Affected Systems

Homarr dashboards running any version prior to 1.54.0, in particular releases up to 1.53.x, are affected. The vendor product homarr‑labs:homarr is the only affected system identified in this advisory.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. EPSS indicates a probability of exploitation less than 1%, and the vulnerability is not yet listed in CISA's KEV catalog, implying low current exploitation likelihood. The likely attack vector is a remote HTTP request to the Homarr instance, which does not require authentication to reach the vulnerable endpoint. Once accessed, the attacker can gather internal URLs and service metadata, potentially facilitating further attacks.

Generated by OpenCVE AI on April 17, 2026 at 12:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Homarr to version 1.54.0 or later to apply the patch that requires authentication for the integration.all endpoint.
  • Deploy the Homarr instance behind a firewall or reverse proxy that restricts access to trusted networks or requires authentication before reaching the application.
  • Configure network ACLs to allow inbound traffic only from known internal services or IP ranges, ensuring that unauthenticated external requests cannot reach the Homarr API.

Generated by OpenCVE AI on April 17, 2026 at 12:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Homarr
Homarr homarr
CPEs cpe:2.3:a:homarr:homarr:*:*:*:*:*:*:*:*
Vendors & Products Homarr
Homarr homarr

Mon, 09 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Homarr-labs
Homarr-labs homarr
Vendors & Products Homarr-labs
Homarr-labs homarr

Sat, 07 Mar 2026 06:00:00 +0000

Type Values Removed Values Added
Description Homarr is an open-source dashboard. Prior to version 1.54.0, the integration.all tRPC endpoint in Homarr is exposed as a publicProcedure, allowing unauthenticated users to retrieve a complete list of configured integrations. This metadata includes sensitive information such as internal service URLs, integration names, and service types. This issue has been patched in version 1.54.0.
Title Homarr: Unauthenticated Information Disclosure (Integration Metadata Leak)
Weaknesses CWE-200
CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-09T20:44:25.718Z

Reserved: 2026-02-24T02:31:33.265Z

Link: CVE-2026-27796

cve-icon Vulnrichment

Updated: 2026-03-09T20:41:57.239Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-07T06:16:09.663

Modified: 2026-03-10T16:24:21.680

Link: CVE-2026-27796

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T12:15:18Z

Weaknesses