Description
GeoNode versions 4.0 before 4.4.5 and 5.0 before 5.0.2 contain a server-side request forgery vulnerability that allows authenticated users with document upload permissions to trigger arbitrary outbound HTTP requests by providing a malicious URL via the doc_url parameter during document upload. Attackers can supply URLs pointing to internal network targets, loopback addresses, RFC1918 addresses, or cloud metadata services to cause the server to make requests to internal resources without SSRF mitigations such as private IP filtering or redirect validation.
Published: 2026-04-10
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authenticated internal SSRF allowing outbound HTTP requests to internal resources
Action: Immediate Patch
AI Analysis

Impact

GeoNode versions 4.0 up to 4.4.4 and 5.0 up to 5.0.1 contain a server‑side request forgery flaw in the document upload feature. An authenticated user with upload permissions can supply a malicious URL via the doc_url parameter, causing the server to perform an HTTP request to any address supplied, including internal network targets, loopback, RFC1918 addresses, or cloud metadata services. The vulnerability permits information disclosure and could be used to mount further attacks against internal services. The weakness is classified as CWE‑918.

Affected Systems

The affected product is GeoNode, released in two main series: version 4.x (from 4.0 through 4.4.4) and version 5.x (from 5.0 through 5.0.1). All earlier releases in these ranges are vulnerable until a patch is applied.

Risk and Exploitability

The CVSS score of 5.3 indicates medium severity. Exploitation requires the attacker to be an authenticated user with document upload rights; there is no mention of privilege escalation or external access. EPSS data is not available, and the flaw is not listed in CISA’s KEV catalog, suggesting that widespread exploitation is unlikely but not impossible. Because the affected systems can reach internal network resources, the risk to the internal network is moderate, warranting prompt attention.

Generated by OpenCVE AI on April 10, 2026 at 21:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade GeoNode to version 4.4.5 or later, or to version 5.0.2 or later to fully address the SSRF vulnerability.

Generated by OpenCVE AI on April 10, 2026 at 21:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 01:15:00 +0000


Wed, 15 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Geosolutionsgroup
Geosolutionsgroup geonode
CPEs cpe:2.3:a:geosolutionsgroup:geonode:*:*:*:*:*:*:*:*
Vendors & Products Geosolutionsgroup
Geosolutionsgroup geonode
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}


Mon, 13 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Geonode
Geonode geonode
Vendors & Products Geonode
Geonode geonode

Fri, 10 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Description GeoNode versions 4.0 before 4.4.5 and 5.0 before 5.0.2 contain a server-side request forgery vulnerability that allows authenticated users with document upload permissions to trigger arbitrary outbound HTTP requests by providing a malicious URL via the doc_url parameter during document upload. Attackers can supply URLs pointing to internal network targets, loopback addresses, RFC1918 addresses, or cloud metadata services to cause the server to make requests to internal resources without SSRF mitigations such as private IP filtering or redirect validation.
Title GeoNode < 4.4.5, 5.0.2 SSRF via Document Upload
Weaknesses CWE-918
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:L'}


Subscriptions

Geonode Geonode
Geosolutionsgroup Geonode
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-16T00:40:03.983Z

Reserved: 2026-04-07T20:57:06.210Z

Link: CVE-2026-39921

cve-icon Vulnrichment

Updated: 2026-04-13T12:29:45.449Z

cve-icon NVD

Status : Modified

Published: 2026-04-10T20:16:22.083

Modified: 2026-04-16T01:16:09.877

Link: CVE-2026-39921

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:57:24Z

Weaknesses