Description
A vulnerability was identified in Page-Replica Page Replica up to e4a7f52e75093ee318b4d5a9a9db6751050d2ad0. The impacted element is the function sitemap.fetch of the file /sitemap of the component Endpoint. The manipulation of the argument url leads to server-side request forgery. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-27
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery (SSRF)
Action: Apply Workaround
AI Analysis

Impact

The vulnerability is located in the sitemap.fetch function of the /sitemap endpoint in Page‑Replica. By controlling the url parameter, an attacker can instruct the server to issue HTTP requests to arbitrary hosts. This permits the attacker to reach internal services, exfiltrate data, or launch secondary attacks. The weakness falls under CWE‑918 and results in a Server‑Side Request Forgery that compromises confidentiality and integrity of internal network resources.

Affected Systems

All releases of Page‑Replica up to commit e4a7f52e75093ee318b4d5a9a9db6751050d2ad0 are affected. Because the project follows a rolling‑release model, no specific version numbers are available for a fixed release. Any deployed instance that has not received the latest code changes may still be vulnerable.

Risk and Exploitability

The CVSS score of 5.3 reflects moderate severity; the attack is remote and requires access to the vulnerable endpoint but does not grant elevated permissions. No EPSS score is provided and the issue is not listed in the KEV catalog, yet a public exploit exists, suggesting that attackers could exploit it. The risk is therefore moderate to high until a vendor patch or adequate mitigation is applied.

Generated by OpenCVE AI on March 27, 2026 at 07:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the project’s repository for a newer commit or release that includes a fix for the sitemap.fetch SSRF issue.
  • If a patched version is available, upgrade Page‑Replica to the latest release.
  • Restrict outbound traffic from the Page‑Replica server using firewall rules or a proxy to limit connections to approved internal services.
  • Validate and whitelist the url parameter on the /sitemap endpoint to allow only safe destinations.
  • Monitor logs for unexpected outbound requests from the server and investigate any anomalies.

Generated by OpenCVE AI on March 27, 2026 at 07:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Page-replica
Page-replica page Replica
Vendors & Products Page-replica
Page-replica page Replica

Fri, 27 Mar 2026 04:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Page-Replica Page Replica up to e4a7f52e75093ee318b4d5a9a9db6751050d2ad0. The impacted element is the function sitemap.fetch of the file /sitemap of the component Endpoint. The manipulation of the argument url leads to server-side request forgery. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified. The vendor was contacted early about this disclosure but did not respond in any way.
Title Page-Replica Page Replica Endpoint sitemap sitemap.fetch server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Page-replica Page Replica
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-27T13:49:21.469Z

Reserved: 2026-03-26T16:01:47.880Z

Link: CVE-2026-4907

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-27T02:16:00.330

Modified: 2026-03-27T02:16:00.330

Link: CVE-2026-4907

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:22:23Z

Weaknesses