Description
A vulnerability has been found in psi-probe PSI Probe up to 5.3.0. This affects the function lookup of the file psi-probe-core/src/main/java/psiprobe/tools/Whois.java of the component Whois. The manipulation leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-26
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SSRF
Action: Patch
AI Analysis

Impact

The vulnerability resides in the Whois lookup function of PSI Probe, allowing an attacker to instruct the application to perform HTTP requests to arbitrary URLs. This server‑side request forgery can be triggered remotely through exposed lookup inputs. The weakness is identified as CWE‑918 and can potentially expose internal or external resources that the server can reach.

Affected Systems

PSI Probe versions up to and including 5.3.0 are affected. The flaw is located within the file psi-probe-core/src/main/java/psiprobe/tools/Whois.java in the Whois component.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity. The EPSS score is reported as less than 1 % and the vulnerability is not listed in the CISA KEV catalog, suggesting a low likelihood of immediate exploitation. Nonetheless, because the flaw permits arbitrary outbound calls, a remote attacker could potentially probe internal services or reach otherwise unavailable endpoints. The attack vector is remote, through any interface that accepts lookup parameters.

Generated by OpenCVE AI on April 17, 2026 at 14:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PSI Probe to a version newer than 5.3.0 where the SSRF issue is fixed.
  • Restrict PSI Probe’s outbound network access or apply firewall rules to block internal or unintended target addresses.
  • If an upgrade is not immediately possible, disable or restrict access to the Whois lookup feature and implement URL validation or a whitelist to allow only approved domains.

Generated by OpenCVE AI on April 17, 2026 at 14:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-429m-9874-rx9w PSI Probe vulnerable to Server-Side Request Forgery
History

Tue, 03 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:psi-probe:psi_probe:*:*:*:*:*:*:*:*

Fri, 27 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Psi-probe
Psi-probe psi Probe
Vendors & Products Psi-probe
Psi-probe psi Probe

Fri, 27 Feb 2026 00:00:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in psi-probe PSI Probe up to 5.3.0. This affects the function lookup of the file psi-probe-core/src/main/java/psiprobe/tools/Whois.java of the component Whois. The manipulation leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title psi-probe PSI Probe Whois Whois.java lookup server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Psi-probe Psi Probe
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-27T19:55:03.743Z

Reserved: 2026-02-26T15:13:42.721Z

Link: CVE-2026-3270

cve-icon Vulnrichment

Updated: 2026-02-27T19:54:51.795Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T00:16:58.930

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3270

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T14:15:21Z

Weaknesses