Description
A weakness has been identified in welovemedia FFmate up to 2.0.15. This affects the function fireWebhook of the file /internal/service/webhook/webhook.go. Executing a manipulation can lead to server-side request forgery. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-07
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Monitor
AI Analysis

Impact

A weakness in welovemedia FFmate up to version 2.0.15 allows an attacker to invoke the fireWebhook function in /internal/service/webhook/webhook.go with a specially crafted URL. This results in a server‑side request forgery (CWE‑918) that forces FFmate to send HTTP requests to arbitrary destinations, potentially exposing internal services, leaking sensitive data, or enabling further credential‑based attacks. The flaw can be triggered remotely and an exploit program has been publicly released, making it readily usable to an attacker with minimal effort.

Affected Systems

The vulnerability affects all installations of welovemedia FFmate running up to and including version 2.0.15. No later releases are listed as impacted; thus any newer version is presumed to be unaffected.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1% suggests a low current exploitation probability. The flaw is not yet listed in the CISA KEV catalog, but because the exploit is publicly available and can be launched over the network, the risk to organizations that have not yet patched or mitigated remains significant. The likely attack vector is an unauthenticated request to FFmate’s webhook endpoint with a URL pointing to an internal or otherwise protected resource. Without a vendor response, mitigation must rely on administrative controls until a patch is released.

Generated by OpenCVE AI on April 16, 2026 at 04:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade FFmate to a version newer than 2.0.15 as soon as a vendor fix becomes available.
  • If the webhook feature is not required, disable it or remove its configuration so the fireWebhook endpoint cannot be accessed.
  • Block outbound HTTP traffic from the FFmate host to internal networks and to any addresses that could be targeted by a server‑side request forgery, using firewall or network segmentation rules.

Generated by OpenCVE AI on April 16, 2026 at 04:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Welovemedia
Welovemedia ffmate
Vendors & Products Welovemedia
Welovemedia ffmate

Sat, 07 Mar 2026 23:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in welovemedia FFmate up to 2.0.15. This affects the function fireWebhook of the file /internal/service/webhook/webhook.go. Executing a manipulation can lead to server-side request forgery. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title welovemedia FFmate webhook.go fireWebhook server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:C'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:C'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Welovemedia Ffmate
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T16:27:51.191Z

Reserved: 2026-03-06T21:29:27.732Z

Link: CVE-2026-3681

cve-icon Vulnrichment

Updated: 2026-03-11T16:22:52.634Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-07T23:15:48.063

Modified: 2026-03-09T13:35:07.393

Link: CVE-2026-3681

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T04:30:13Z

Weaknesses