Impact
The Lemmy link aggregator is vulnerable to a Server‑Side Request Forgery (SSRF) that allows an unauthenticated attacker to inject arbitrary query parameters into the file_type query string of the /api/v4/image/{filename} endpoint, causing the internal pict‑rs service to fetch arbitrary URLs. This flaw permits the attacker to coerce the server into making outbound HTTP requests to arbitrary destinations, potentially exposing internal resources or exfiltrating data. The weakness is a classic case of insecure proxy use, mapped to CWE‑918.
Affected Systems
The flaw exists in LemmyNet Lemmy versions older than 0.19.16, where the activitypub_federation dependency is used to route image requests via pict‑rs.
Risk and Exploitability
The vulnerability has a CVSS score of 7.7 and an EPSS score less than 1%, indicating high severity but very low probability of exploitation. It is not listed in CISA’s KEV catalog. The attack vector is likely remote, through the publicly accessible /api/v4/image endpoint, and requires no authentication. The patch is available in version 0.19.16, making upgrade the most effective mitigation.
OpenCVE Enrichment
Github GHSA