Description
Squidex is an open source headless content management system and content management hub. Prior to version 7.23.0, the Squidex Restore API is vulnerable to Blind Server-Side Request Forgery (SSRF). The application fails to validate the URI scheme of the user-supplied `Url` parameter, allowing the use of the `file://` protocol. This allows an authenticated administrator to force the backend server to interact with the local filesystem, which can lead to Local File Interaction (LFI) and potential disclosure of sensitive system information through side-channel analysis of internal logs. Version 7.23.0 contains a fix.
Published: 2026-04-22
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Blind SSRF with local file interaction
Action: Apply Patch
AI Analysis

Impact

The Squidex Restore API accepts a user‑supplied Url parameter without validating its scheme, permitting use of the file:// protocol. An authenticated administrator can force the backend server to access any local file via the Restore API, leading to local file interaction and potential disclosure of sensitive information through side‑channel analysis of internal logs. The flaw does not provide arbitrary code execution.

Affected Systems

All Squidex installations running a version earlier than 7.23.0 are vulnerable. The exploitation requires administrator privileges to the HQ API; only users with such access can invoke the Restore endpoint. Version 7.23.0 and later contain the fix.

Risk and Exploitability

The CVSS base score of 5.5 indicates moderate severity. The EPSS score of < 1% shows a very low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. Because the attack requires authenticated administrator access, the risk is limited to environments where such accounts are compromised or misused. No remote, unauthenticated attacker can exploit the flaw.

Generated by OpenCVE AI on April 28, 2026 at 07:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Squidex to version 7.23.0 or later to eliminate the blind SSRF issue.
  • Limit the scope of administrator API credentials and ensure only trusted users have access to the HQ API.
  • Monitor and audit logs for unexpected file access attempts involving the Restore API, and block suspicious patterns.

Generated by OpenCVE AI on April 28, 2026 at 07:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Squidex.io
Squidex.io squidex
Vendors & Products Squidex.io
Squidex.io squidex

Thu, 23 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Description Squidex is an open source headless content management system and content management hub. Prior to version 7.23.0, the Squidex Restore API is vulnerable to Blind Server-Side Request Forgery (SSRF). The application fails to validate the URI scheme of the user-supplied `Url` parameter, allowing the use of the `file://` protocol. This allows an authenticated administrator to force the backend server to interact with the local filesystem, which can lead to Local File Interaction (LFI) and potential disclosure of sensitive system information through side-channel analysis of internal logs. Version 7.23.0 contains a fix.
Title Squidex has Blind SSRF via file:// Protocol in Restore API leading to Local File Interaction
Weaknesses CWE-73
CWE-918
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L'}


Subscriptions

Squidex.io Squidex
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-23T16:24:31.604Z

Reserved: 2026-04-17T16:34:45.526Z

Link: CVE-2026-41177

cve-icon Vulnrichment

Updated: 2026-04-23T13:51:03.313Z

cve-icon NVD

Status : Deferred

Published: 2026-04-22T22:16:31.957

Modified: 2026-04-24T14:45:24.803

Link: CVE-2026-41177

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T08:00:14Z

Weaknesses