Impact
Incus image import performs an outbound HTTP HEAD request to a user supplied URL before enforcing project policy restrictions such as restricted.images.servers. The request contains custom headers that expose the host’s architecture and version. The SSRF is blind because the actual image download is blocked by policy, but the request is still issued. This allows an authenticated user to coerce the daemon into contacting arbitrary internal endpoints and leaking information about the host environment, which can be leveraged to probe internal services or cloud metadata endpoints.
Affected Systems
All Incus installations running a version earlier than 7.0.0 are affected. The vulnerability exists in every release before the 7.0.0 update, regardless of the operating system or deployment topology.
Risk and Exploitability
The CVSS score is 5.3, indicating moderate exploitation risk. EPSS data is not available and the vulnerability is not listed in CISA’s KEV catalog. The attack requires an authenticated user with permission to import images, yet it can still be used to discover internal network services or cloud metadata. The exploit path is straightforward: an attacker sends an image import request with a crafted source URL, and the daemon performs a blind HEAD request before rejecting the image based on policy.
OpenCVE Enrichment
Github GHSA