Description
Ech0 is an open-source, self-hosted publishing platform for personal idea sharing. Prior to 4.2.8, the GET /api/website/title endpoint accepts an arbitrary URL via the website_url query parameter and makes a server-side HTTP request to it without any validation of the target host or IP address. The endpoint requires no authentication. An attacker can use this to reach internal network services, cloud metadata endpoints (169.254.169.254), and localhost-bound services, with partial response data exfiltrated via the HTML <title> tag extraction This vulnerability is fixed in 4.2.8.
Published: 2026-04-06
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure via Unauthenticated SSRF
Action: Immediate Patch
AI Analysis

Impact

The vulnerability lies in the GET /api/website/title endpoint of Ech0, which accepts an arbitrary URL via the website_url query parameter. Because the server performs an unvalidated HTTP request without requiring authentication, an attacker can trigger a Server‐Side Request Forgery. This allows the attacker to reach internal network services, cloud metadata endpoints such as 169.254.169.254, and localhost‐bound services, and the resulting response data can be partially exfiltrated through the HTML <title> tag, leaking sensitive information.

Affected Systems

The issue affects the open‑source Ech0 publishing platform from lin‑snow, specifically any release prior to version 4.2.8. Users running version 4.2.7 or earlier are vulnerable, while version 4.2.8 and later include the fix that validates and restricts outbound requests. No other products or vendors are listed in the advisory.

Risk and Exploitability

The CVSS score of 7.2 classifies the flaw as high severity, and the endpoint is publicly accessible without authentication, making exploitation straightforward. EPSS data is not available, and the vulnerability is not currently in CISA’s KEV catalog; however, the ability to reach internal or cloud metadata services poses a real threat. The attack path involves sending a crafted GET request to /api/website/title with a malicious website_url pointing to an internal endpoint, after which portions of the response are returned in the <title> tag and can be read by the attacker.

Generated by OpenCVE AI on April 6, 2026 at 21:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Ech0 to version 4.2.8 or later to apply the SSRF fix.
  • If an upgrade is not immediately possible, restrict outbound HTTP requests from the Ech0 server to internal IP ranges or implement a firewall rule to block 127.0.0.1, 169.254.169.254, and the local network.
  • Monitor network traffic for unusual SSRF patterns and check Ech0 for new releases.

Generated by OpenCVE AI on April 6, 2026 at 21:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-cqgf-f4x7-g6wc Ech0: Unauthenticated SSRF in GetWebsiteTitle allows access to internal services and cloud metadata
History

Wed, 22 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Ech0
Ech0 ech0
CPEs cpe:2.3:a:ech0:ech0:*:*:*:*:*:*:*:*
Vendors & Products Ech0
Ech0 ech0

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Lin-snow
Lin-snow ech0
Vendors & Products Lin-snow
Lin-snow ech0

Mon, 06 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 06 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description Ech0 is an open-source, self-hosted publishing platform for personal idea sharing. Prior to 4.2.8, the GET /api/website/title endpoint accepts an arbitrary URL via the website_url query parameter and makes a server-side HTTP request to it without any validation of the target host or IP address. The endpoint requires no authentication. An attacker can use this to reach internal network services, cloud metadata endpoints (169.254.169.254), and localhost-bound services, with partial response data exfiltrated via the HTML <title> tag extraction This vulnerability is fixed in 4.2.8.
Title Ech0 affected by unauthenticated SSRF in GetWebsiteTitle allows access to internal services and cloud metadata
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-06T18:48:39.909Z

Reserved: 2026-03-31T21:06:06.428Z

Link: CVE-2026-35037

cve-icon Vulnrichment

Updated: 2026-04-06T18:48:35.305Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T17:17:13.093

Modified: 2026-04-22T18:59:55.523

Link: CVE-2026-35037

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:31:30Z

Weaknesses