Description
Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, a Server-Side Request Forgery (SSRF) issue exists in the external page migration feature of the Page Management Plugin. Versions 1.41.1 and 2.41.1 contain a patch.
Published: 2026-03-23
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑side request forgery allowing the CMS to make arbitrary outbound requests
Action: Immediate Patch
AI Analysis

Impact

Connect‑CMS includes a server‑side request forgery vulnerability in the External Page Migration feature of the Page Management Plugin. The likely attack vector is that an attacker supplies a crafted migration URL, causing the CMS server to initiate HTTP requests to arbitrary internal or external addresses. Based on the description, it is inferred that such requests could expose confidential resources, bypass network segmentation, or serve as a foothold for further attacks against the host system or underlying network. The weakness is classified as CWE‑918.

Affected Systems

Versions of Connect‑CMS from the 1.x series up to 1.41.0 and the 2.x series up to 2.41.0 are affected. Versions 1.41.1 and 2.41.1 contain a patch that eliminates the SSRF condition. The affected product is identified as opensource‑workshop Connect‑CMS.

Risk and Exploitability

The CVSS score of 6.8 indicates a medium severity impact, while the EPSS score of less than 1% suggests a low likelihood of active exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the ability to invoke the external page migration function—which may be reachable by authenticated users with plugin access or potentially by unauthenticated users if the feature is exposed. This inference comes directly from the described symptom that the flaw exists in the page migration feature. Although the statistical likelihood is currently low, the potential to reach internal services or sensitive data makes prompt remediation advisable.

Generated by OpenCVE AI on March 24, 2026 at 22:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Connect‑CMS to version 1.41.1 or 2.41.1 where the SSRF is fixed.
  • If an upgrade cannot yet be performed, disable the External Page Migration feature within the Page Management Plugin to block the attack pathway.
  • Monitor server logs for unexpected outbound requests originating from Connect‑CMS as an early indicator of exploitation attempts.

Generated by OpenCVE AI on March 24, 2026 at 22:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-jh46-85jr-6ph9 Connect CMS has SSRF in the External Page Migration Feature of its Page Management Plugin
History

Tue, 24 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:opensource-workshop:connect-cms:*:*:*:*:*:*:*:*

Tue, 24 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Opensource-workshop
Opensource-workshop connect-cms
Vendors & Products Opensource-workshop
Opensource-workshop connect-cms

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Description Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, a Server-Side Request Forgery (SSRF) issue exists in the external page migration feature of the Page Management Plugin. Versions 1.41.1 and 2.41.1 contain a patch.
Title Connect CMS has SSRF in the External Page Migration Feature of its Page Management Plugin
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}


Subscriptions

Opensource-workshop Connect-cms
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-24T13:40:01.660Z

Reserved: 2026-03-11T15:05:48.401Z

Link: CVE-2026-32279

cve-icon Vulnrichment

Updated: 2026-03-24T13:39:53.756Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-23T22:16:27.617

Modified: 2026-03-24T20:28:36.733

Link: CVE-2026-32279

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:36:21Z

Weaknesses