Description
A vulnerability has been found in SourceCodester Website Link Extractor 1.0. This vulnerability affects the function file_get_contents of the component URL Handler. The manipulation leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-02-25
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Patch
AI Analysis

Impact

The vulnerability arises from the file_get_contents function in the URL Handler, which accepts user‑supplied URLs without proper validation. An attacker can send crafted requests that cause the application to fetch arbitrary URLs, enabling Server‑Side Request Forgery. This remote flaw can expose internal network services, exfiltrate sensitive data, or serve as a foothold for more advanced attacks. The impact is moderate, with potential confidentiality and integrity risks depending on the target resources.

Affected Systems

SourceCodester:Website Link Extractor version 1.0 is affected. This product is provided by SourceCodester under the name Website Link Extractor.

Risk and Exploitability

The CVSS base score is 5.3, indicating a moderate risk. The EPSS score is less than 1 %, suggesting a low likelihood of exploitation at this time, and the vulnerability is not listed in the CISA KEV catalog. The flaw can be triggered remotely, without authentication, by supplying a malicious URL to the vulnerable file_get_contents call. No special infrastructure or credentials are required beyond the ability to submit a URL to the application.

Generated by OpenCVE AI on April 17, 2026 at 15:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s official patch or upgrade to a newer version of Website Link Extractor that removes the unsafe file_get_contents usage.
  • If no patch is available, restrict the web server’s outbound traffic to prevent it from reaching internal networks or other sensitive services.
  • Implement strict input validation or a whitelist of allowed domains before calling file_get_contents to ensure only trusted URLs are fetched.

Generated by OpenCVE AI on April 17, 2026 at 15:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Remyandrade
Remyandrade website Link Extractor
CPEs cpe:2.3:a:remyandrade:website_link_extractor:1.0:*:*:*:*:*:*:*
Vendors & Products Remyandrade
Remyandrade website Link Extractor

Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester website Link Extractor
Vendors & Products Sourcecodester
Sourcecodester website Link Extractor

Wed, 25 Feb 2026 06:00:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in SourceCodester Website Link Extractor 1.0. This vulnerability affects the function file_get_contents of the component URL Handler. The manipulation leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Title SourceCodester Website Link Extractor URL file_get_contents server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Remyandrade Website Link Extractor
Sourcecodester Website Link Extractor
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-25T18:35:10.498Z

Reserved: 2026-02-24T21:54:15.737Z

Link: CVE-2026-3163

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T06:16:26.973

Modified: 2026-02-25T15:13:39.343

Link: CVE-2026-3163

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T15:30:06Z

Weaknesses