Description
A security flaw has been discovered in FlowCI flow-core-x up to 1.23.01. The impacted element is the function Save of the file core/src/main/java/com/flowci/core/config/service/ConfigServiceImpl.java of the component SMTP Host Handler. The manipulation results in server-side request forgery. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-16
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server-side request forgery
Action: Patch
AI Analysis

Impact

A flaw in the SMTP Host Handler within FlowCI flow-core-x disables normal validation when saving SMTP host configuration. As a result, an attacker can craft a request that forces the application to reach arbitrary internal or external URLs, achieving server‑side request forgery (SSRF). This attack allows a remote adversary to probe internal network services, exfiltrate data, or potentially access privileged resources that otherwise would be unreachable from the public network.

Affected Systems

The vulnerability exists in FlowCI flow-core-x versions up to and including 1.23.01. No specific sub‑versions are listed, so all builds of the component prior to 1.23.01 are potentially affected.

Risk and Exploitability

The CVSSv3 base score is 5.3, indicating a moderate severity. The EPSS score is less than 1%, suggesting a low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, and an exploit has been publicly released, meaning that remote attackers can perform the SSRF without additional prerequisites. Attackers must be able to reach the application over the network to trigger the vulnerable save operation.

Generated by OpenCVE AI on March 17, 2026 at 11:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply vendor patch as soon as available.
  • Limit outbound SMTP requests to trusted hosts via firewall rules.
  • Disable external SMTP host configuration editing unless absolutely necessary.
  • Monitor application logs for unexpected outbound traffic.
  • Contact FlowCI support for guidance and updates.

Generated by OpenCVE AI on March 17, 2026 at 11:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Flowci
Flowci flow-core-x
Vendors & Products Flowci
Flowci flow-core-x

Mon, 16 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 04:45:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in FlowCI flow-core-x up to 1.23.01. The impacted element is the function Save of the file core/src/main/java/com/flowci/core/config/service/ConfigServiceImpl.java of the component SMTP Host Handler. The manipulation results in server-side request forgery. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title FlowCI flow-core-x SMTP Host ConfigServiceImpl.java save server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Flowci Flow-core-x
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-16T18:46:08.066Z

Reserved: 2026-03-15T15:05:22.159Z

Link: CVE-2026-4215

cve-icon Vulnrichment

Updated: 2026-03-16T18:46:04.132Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-16T14:20:08.510

Modified: 2026-03-16T14:53:07.390

Link: CVE-2026-4215

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:45:53Z

Weaknesses