Description
A vulnerability was detected in bufanyun HotGo up to 2.0. This issue affects the function ImageTransferStorage of the file /server/internal/logic/common/upload.go of the component Endpoint. The manipulation results in server-side request forgery. The attack may be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-07
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in the ImageTransferStorage function of HotGo version 2.0 or earlier, allowing an attacker to construct requests that force the server to make HTTP requests to arbitrary URLs. The manipulation can be achieved remotely and the exploit code is publicly available. Successful exploitation enables the attacker to read or manipulate data on external services, potentially exfiltrate confidential information or launch further attacks through the server’s outbound connections. The flaw is identified as CWE‑918.

Affected Systems

Bufanyun HotGo component Endpoint is affected for all releases up to and including version 2.0. Versions newer than 2.0 have not been reported to contain this issue and are presumed safe.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and the very low EPSS (< 1%) suggests a low probability of widespread exploitation. The vulnerability is not listed in the CISA KEV catalog. The attack path requires remote access to the vulnerable endpoint, typically exposed on the public network, making the exploit feasible from an external attacker’s perspective. While it does not grant arbitrary code execution, it can allow data exfiltration and manipulative outbound requests.

Generated by OpenCVE AI on April 16, 2026 at 04:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update HotGo to a version that removes the vulnerable ImageTransferStorage functionality; if no patch is available, contact the vendor for a fix or consider downgrading to a release where the function is disabled.
  • Configure network security controls such as a firewall or proxy to restrict outbound HTTP calls from the application to a whitelisted set of hosts and ports, limiting the impact of any potential server‑side request forgery.
  • Implement input validation or a hostname whitelist on the ImageTransferStorage endpoint to ensure only approved domains are requested, providing an interim safeguard while a patch is applied.

Generated by OpenCVE AI on April 16, 2026 at 04:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Bufanyun
Bufanyun hotgo
Vendors & Products Bufanyun
Bufanyun hotgo

Sat, 07 Mar 2026 23:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in bufanyun HotGo up to 2.0. This issue affects the function ImageTransferStorage of the file /server/internal/logic/common/upload.go of the component Endpoint. The manipulation results in server-side request forgery. The attack may be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title bufanyun HotGo Endpoint upload.go ImageTransferStorage server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T16:27:40.422Z

Reserved: 2026-03-06T21:32:05.408Z

Link: CVE-2026-3683

cve-icon Vulnrichment

Updated: 2026-03-11T16:22:46.674Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-08T00:16:14.027

Modified: 2026-03-09T13:35:07.393

Link: CVE-2026-3683

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T04:30:13Z

Weaknesses