Impact
The ingest pipeline in OpenSift accepts user-provided URLs without adequate destination validation. Private/local host checks are present, but restrictions for credentialed URLs, non-standard ports, and cross-host redirects are missing. This creates SSRF-style abuse paths that can allow an attacker to reach internal resources, exposing confidential data or enabling further compromise. The vulnerability is classified as CWE‑918, reflecting a lack of proper access control for remote resources.
Affected Systems
OpenSift – any instance running a version earlier than 1.6.3‑alpha. The affected code is part of the URL ingest pipeline used by the OpenSift AI study tool. The fix is implemented in release v1.6.3‑alpha.
Risk and Exploitability
The vulnerability carries a CVSS score of 8.2, indicating high severity. Its EPSS score is below 1%, implying a very low probability of exploitation at this time, and it is not listed in the CISA KEV catalog. Nevertheless, the attack can be executed by any user able to submit ingestion requests, using specially crafted URLs that bypass the incomplete destination checks and reach services on internal addresses, potentially exposing internal data or facilitating further lateral movement.
OpenCVE Enrichment