Description
WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.3.0, a DNS rebinding vulnerability in the web_fetch tool allows an unauthenticated attacker to bypass URL validation and access internal resources on the server, including private IP addresses (e.g., 127.0.0.1, 192.168.x.x). By crafting a malicious domain that resolves to a public IP during validation and subsequently resolves to a private IP during execution, an attacker can access sensitive local services and potentially exfiltrate data. This issue has been patched in version 0.3.0.
Published: 2026-03-07
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized internal resource access via SSRF (DNS rebinding)
Action: Patch to 0.3.0
AI Analysis

Impact

The vulnerability is a DNS rebinding flaw in the web_fetch component of WeKnora that lets an unauthenticated attacker bypass URL validation. By submitting a domain that maps to a public IP during validation and to a private IP during execution, the attacker can activate server‑side request forgery and retrieve data from internal services such as 127.0.0.1 or 192.168.x.x. This breach can expose sensitive information and compromise the confidentiality of the internal network. The weakness maps to CWE‑918, reflecting a failure to validate or restrict network requests.

Affected Systems

Tencent’s WeKnora framework, all releases before version 0.3.0, employs this web_fetch tool without a protective check. The flaw affects any installation of WeKnora where the tool is enabled, regardless of the host platform, because DNS rebinding can be triggered by an external party with nothing more than a crafted domain.

Risk and Exploitability

The CVSS base score of 6.5 indicates a moderate severity that could lead to data exposure. The EPSS value of less than 1 % suggests that, as of now, the probability of mass exploitation is low, and the vulnerability is not recorded in the CISA KEV list. Nonetheless, the attack requires only creation of a malicious domain and no additional privileged access, making it accessible to a broad threat set. If compromised, an attacker could pivot to internal services or extract data, so the risk remains significant for environments that expose WeKnora to the internet.

Generated by OpenCVE AI on April 16, 2026 at 10:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the patched release 0.3.0 or later to eliminate the DNS rebinding flaw.
  • Restrict outbound DNS queries from the web_fetch component to known safe domains or implement a firewall rule that blocks access to private IP ranges from the application layer.
  • Disable the web_fetch tool or remove it from the production environment if an immediate upgrade is not possible, and monitor for any SSRF‑related request patterns.

Generated by OpenCVE AI on April 16, 2026 at 10:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-h6gw-8f77-mmmp WeKnora has DNS Rebinding Vulnerability in web_fetch Tool that Allows SSRF to Internal Resources
History

Mon, 09 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:tencent:weknora:*:*:*:*:*:*:*:*

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tencent
Tencent weknora
Vendors & Products Tencent
Tencent weknora

Sat, 07 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.3.0, a DNS rebinding vulnerability in the web_fetch tool allows an unauthenticated attacker to bypass URL validation and access internal resources on the server, including private IP addresses (e.g., 127.0.0.1, 192.168.x.x). By crafting a malicious domain that resolves to a public IP during validation and subsequently resolves to a private IP during execution, an attacker can access sensitive local services and potentially exfiltrate data. This issue has been patched in version 0.3.0.
Title WeKnora: DNS Rebinding Vulnerability in web_fetch Tool Allows SSRF to Internal Resources
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-09T18:24:21.174Z

Reserved: 2026-03-05T21:27:35.342Z

Link: CVE-2026-30858

cve-icon Vulnrichment

Updated: 2026-03-09T17:52:19.590Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-07T17:15:53.523

Modified: 2026-03-09T17:34:39.527

Link: CVE-2026-30858

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T11:00:10Z

Weaknesses