Description
GeoNode versions 4.4.5 and 5.0.2 (and prior within their respective releases) contain a server-side request forgery vulnerability in the service registration endpoint that allows authenticated attackers to trigger outbound network requests to arbitrary URLs by submitting a crafted service URL during form validation. Attackers can probe internal network targets including loopback addresses, RFC1918 private IP ranges, link-local addresses, and cloud metadata services by exploiting insufficient URL validation in the WMS service handler without private IP filtering or allowlist enforcement.
Published: 2026-04-10
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Patch
AI Analysis

Impact

GeoNode versions 4.4.5 and 5.0.2, and earlier releases in the same series, contain a server‑side request forgery flaw in the service registration endpoint. Authenticated attackers can submit a crafted service URL that the server validates and subsequently fetches, causing outbound HTTP(S) requests to arbitrary destinations. This ability lets attackers probe internal network assets—including loopback interfaces, RFC1918 private ranges, link‑local addresses, and cloud metadata services—by exploiting insufficient URL validation in the WMS service handler lacking private‑IP filtering or allowlist enforcement. The vulnerability is classified as CWE‑918.

Affected Systems

Affected versions are GeoNode 4.0 through 4.4.4 and GeoNode 5.0 through 5.0.1. The product is GeoNode, an open‑source platform for geospatial content management. Patches that address this issue are available in GeoNode 4.4.5 and 5.0.2, as referenced in the official release notes.

Risk and Exploitability

The CVSS v3.1 score is 5.3, indicating medium severity. EPSS score is <1%, suggesting a low but non‑zero probability of exploitation, and the flaw is not currently listed in the CISA KEV catalog. Because only authenticated users can trigger the SSRF, the attack requires valid credentials and presumably a web session. Nonetheless, an attacker could use the discovered bypass to discover internal host addresses or access privileged metadata endpoints, which could serve as a foothold for further exploitation. Organizations should promptly assess whether their installations run a vulnerable version and prioritize applying the available patch.

Generated by OpenCVE AI on April 17, 2026 at 08:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade GeoNode to version 4.4.5 or 5.0.2 or later to eliminate the SSRF flaw.
  • If an immediate upgrade is not possible, disable the service registration form or restrict outbound network traffic from the GeoNode application to prevent requests to internal or private IP ranges.
  • Monitor application logs for attempts to register services and review network traffic for unexpected outbound connections.

Generated by OpenCVE AI on April 17, 2026 at 08:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 01:30:00 +0000


Thu, 16 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Description GeoNode versions 4.0 before 4.4.5 and 5.0 before 5.0.2 contain a server-side request forgery vulnerability in the service registration endpoint that allows authenticated attackers to trigger outbound network requests to arbitrary URLs by submitting a crafted service URL during form validation. Attackers can probe internal network targets including loopback addresses, RFC1918 private IP ranges, link-local addresses, and cloud metadata services by exploiting insufficient URL validation in the WMS service handler without private IP filtering or allowlist enforcement. GeoNode versions 4.4.5 and 5.0.2 (and prior within their respective releases) contain a server-side request forgery vulnerability in the service registration endpoint that allows authenticated attackers to trigger outbound network requests to arbitrary URLs by submitting a crafted service URL during form validation. Attackers can probe internal network targets including loopback addresses, RFC1918 private IP ranges, link-local addresses, and cloud metadata services by exploiting insufficient URL validation in the WMS service handler without private IP filtering or allowlist enforcement.
Title GeoNode < 4.4.5, 5.0.2 SSRF via Service Registration GeoNode SSRF via Service Registration
References

Wed, 15 Apr 2026 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Geosolutionsgroup
Geosolutionsgroup geonode
CPEs cpe:2.3:a:geosolutionsgroup:geonode:*:*:*:*:*:*:*:*
Vendors & Products Geosolutionsgroup
Geosolutionsgroup geonode
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}


Mon, 13 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Geonode
Geonode geonode
Vendors & Products Geonode
Geonode geonode

Fri, 10 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Description GeoNode versions 4.0 before 4.4.5 and 5.0 before 5.0.2 contain a server-side request forgery vulnerability in the service registration endpoint that allows authenticated attackers to trigger outbound network requests to arbitrary URLs by submitting a crafted service URL during form validation. Attackers can probe internal network targets including loopback addresses, RFC1918 private IP ranges, link-local addresses, and cloud metadata services by exploiting insufficient URL validation in the WMS service handler without private IP filtering or allowlist enforcement.
Title GeoNode < 4.4.5, 5.0.2 SSRF via Service Registration
Weaknesses CWE-918
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:L'}


Subscriptions

Geonode Geonode
Geosolutionsgroup Geonode
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-16T00:43:12.705Z

Reserved: 2026-04-07T20:57:06.210Z

Link: CVE-2026-39922

cve-icon Vulnrichment

Updated: 2026-04-13T17:36:04.385Z

cve-icon NVD

Status : Modified

Published: 2026-04-10T20:16:22.270

Modified: 2026-04-16T01:16:10.950

Link: CVE-2026-39922

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T09:00:10Z

Weaknesses