Description
Sonicverse is a Self-hosted Docker Compose stack for live radio streaming. The Sonicverse Radio Audio Streaming Stack dashboard contains a Server-Side Request Forgery (SSRF) vulnerability in its API client (apps/dashboard/lib/api.ts). Installations created using the provided install.sh script (including the one‑liner bash <(curl -fsSL https://sonicverse.short.gy/install-audiostack)) are affected. In these deployments, the dashboard accepts user-controlled URLs and passes them directly to a server-side HTTP client without sufficient validation. An authenticated operator can abuse this to make arbitrary HTTP requests from the dashboard backend to internal or external systems. This vulnerability is fixed with commit cb1ddbacafcb441549fe87d3eeabdb6a085325e4.
Published: 2026-04-09
Score: 9.9 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Immediate Patch
AI Analysis

Impact

The audit reveals that the Sonicverse dashboard’s API client accepts user‑controlled URLs and forwards them directly to a server‑side HTTP client without validation, creating a Server‑Side Request Forgery flaw. An attacker who can authenticate as a dashboard operator can instruct the backend to send arbitrary HTTP or HTTPS requests to any internal or external host, potentially leaking sensitive data, exfiltrating files, or enabling pivoting within the network. This can compromise confidentiality, integrity, and availability of internal services that the compromised dashboard can reach.

Affected Systems

The vulnerability affects the Sonicverse Self‑Hosted Docker Compose radio streaming stack (sonicverse-eu:audiostreaming-stack). All installations created with the default install.sh script—including the one‑liner bash <(curl -fsSL https://sonicverse.short.gy/install-audiostack)—are vulnerable. No specific version numbers are provided, so any deployment built from the released source prior to the commit that fixes the issue is susceptible.

Risk and Exploitability

The CVSS v3 score of 9.9 indicates a critical severity with high exploitation weights. Although the EPSS score is unavailable, the lack of presence in the CISA KEV catalog suggests no publicly documented exploit yet. The flaw requires the attacker to have authenticated driver of the dashboard, implying manual over-the-wire actions rather than remote code execution via unauthenticated access. Nevertheless, once authenticated, the attacker can exfiltrate data or leverage the stack to reach other internal endpoints, making the risk significant for exposed or poorly secured deployments.

Generated by OpenCVE AI on April 9, 2026 at 21:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the code base to include the commit that fixes the SSRF (cb1ddbacafcb441549fe87d3eeabdb6a085325e4) or deploy the latest release of the Sonicverse stack after the fix.
  • Re‑run the install.sh script from an updated source that includes the current fix.
  • If an immediate update is not possible, restrict dashboard access to trusted administrators and monitor outbound HTTP requests for anomalous activity.

Generated by OpenCVE AI on April 9, 2026 at 21:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Sonicverse-eu
Sonicverse-eu audiostreaming-stack
Vendors & Products Sonicverse-eu
Sonicverse-eu audiostreaming-stack

Thu, 09 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Description Sonicverse is a Self-hosted Docker Compose stack for live radio streaming. The Sonicverse Radio Audio Streaming Stack dashboard contains a Server-Side Request Forgery (SSRF) vulnerability in its API client (apps/dashboard/lib/api.ts). Installations created using the provided install.sh script (including the one‑liner bash <(curl -fsSL https://sonicverse.short.gy/install-audiostack)) are affected. In these deployments, the dashboard accepts user-controlled URLs and passes them directly to a server-side HTTP client without sufficient validation. An authenticated operator can abuse this to make arbitrary HTTP requests from the dashboard backend to internal or external systems. This vulnerability is fixed with commit cb1ddbacafcb441549fe87d3eeabdb6a085325e4.
Title Sonicverse has Server-Side Request Forgery via user-controlled URLs in dashboard API client
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L'}


Subscriptions

Sonicverse-eu Audiostreaming-stack
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-13T20:20:37.737Z

Reserved: 2026-04-09T00:39:12.206Z

Link: CVE-2026-40089

cve-icon Vulnrichment

Updated: 2026-04-13T20:20:33.688Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-09T20:16:27.743

Modified: 2026-04-13T15:02:27.760

Link: CVE-2026-40089

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:29:28Z

Weaknesses