Description
A vulnerability was determined in Qibo CMS 1.0. Affected by this issue is some unknown functionality of the file /index/image/headers. Executing a manipulation of the argument starts can lead to server-side request forgery. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-20
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: Server‑side request forgery
Action: Assess Impact
AI Analysis

Impact

The flaw exists in the /index/image/headers functionality of Qibo CMS 1.0. An attacker can manipulate the argument "starts" sent to that endpoint and cause the web server to perform an outbound HTTP request to an arbitrary target. This leads to server‑side request forgery, enabling the attacker to reach internal or external services, exfiltrate data, or trigger actions without client interaction. The underlying weakness matches CWE‑918.

Affected Systems

Qibo CMS version 1.0. The vulnerability was identified in an unknown function of the /index/image/headers file. No other versions or products were cited, so only the 1.0 release is known to be affected.

Risk and Exploitability

The CVSS score is 5.3, indicating a medium severity level. No EPSS score is available, so the current likelihood of exploitation cannot be quantified from the data. The issue is not listed in CISA’s KEV catalog, implying no publicly confirmed active exploitation at the time of assessment. The description states the attack can be launched remotely, and the exploit has been publicly disclosed, so an adversary can attempt use against any exposed instance of the problematic endpoint. Because the vendor did not acknowledge or respond, no official fix exists yet, raising the importance of mitigation measures.

Generated by OpenCVE AI on April 20, 2026 at 15:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Identify whether Qibo CMS 1.0 is deployed and determine if the /index/image/headers endpoint is accessible publicly.
  • If the endpoint is in use, consider disabling or removing it or implementing a temporary workaround such as removing the problematic code from the server configuration.
  • Configure network controls (firewall rules, reverse proxy, or web application firewall) to block or limit outbound HTTP requests originating from the CMS process to only trusted destinations.
  • Monitor application logs for unauthorized outbound requests and investigate any anomalies promptly.

Generated by OpenCVE AI on April 20, 2026 at 15:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Qibo CMS 1.0. Affected by this issue is some unknown functionality of the file /index/image/headers. Executing a manipulation of the argument starts can lead to server-side request forgery. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Title Qibo CMS headers server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-20T14:14:18.603Z

Reserved: 2026-04-20T05:40:59.885Z

Link: CVE-2026-6649

cve-icon Vulnrichment

Updated: 2026-04-20T14:12:04.974Z

cve-icon NVD

Status : Received

Published: 2026-04-20T14:16:23.600

Modified: 2026-04-20T14:16:23.600

Link: CVE-2026-6649

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T15:30:06Z

Weaknesses