No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 12 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bubka
Bubka 2fauth |
|
| Vendors & Products |
Bubka
Bubka 2fauth |
Wed, 11 Mar 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | 2FAuth is a web app to manage Two-Factor Authentication (2FA) accounts and generate their security codes. Prior to 6.1.0, a blind SSRF vulnerability exists in 2FAuth that allows authenticated users to make arbitrary HTTP requests from the server to internal networks and cloud metadata endpoints. The image parameter in OTP URL is not properly validated for internal / private IP addresses before making HTTP requests. While the previous fix added response validation to ensure only valid images are stored but HTTP request is still made to arbitrary URLs before this validation occurs. This vulnerability is fixed in 6.1.0. | |
| Title | 2FAuth has Blind SSRF in image parameter allows internal network access and more | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-12T16:17:42.667Z
Reserved: 2026-03-10T22:19:36.546Z
Link: CVE-2026-32133
Updated: 2026-03-12T14:55:29.254Z
Status : Awaiting Analysis
Published: 2026-03-11T22:16:33.273
Modified: 2026-03-12T21:08:22.643
Link: CVE-2026-32133
No data.
OpenCVE Enrichment
Updated: 2026-03-12T09:55:40Z