Description
A flaw has been found in devlikeapro WAHA up to 2026.3.4. This affects an unknown function of the file src/api/media.controller.ts of the component API Request Handler. This manipulation causes server-side request forgery. The attack can be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-25
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑side request forgery
Action: Patch
AI Analysis

Impact

A flaw exists in the media.controller.ts file of the devlikeapro WAHA API Request Handler that allows an attacker to manipulate incoming requests so the server sends HTTP requests to arbitrary URLs. This server‑side request forgery (SSRF) can expose internal resources, enable credential theft, or facilitate further exploitation. The vulnerability is listed as CWE‑918 and is noted to be exploitable from a remote location.

Affected Systems

The affected product is devlikeapro WAHA, for all releases up to and including version 2026.3.4. No other versions are mentioned, and the vendor has not provided a detailed list of affected builds.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate overall risk. The EPSS score is listed as less than 1 %, suggesting a very low probability of real‑world exploitation at the time of this analysis, and the vulnerability is not yet listed in the CISA KEV catalog. However, an exploit has been published and can be triggered remotely, making the risk higher than the low EPSS alone might imply. Without an official vendor patch, the vulnerability remains open for exploitation until a fix is deployed or mitigations are applied.

Generated by OpenCVE AI on April 28, 2026 at 05:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor‑released update for WAHA beyond 2026.3.4 once available.
  • Restrict outgoing network traffic from the WAHA server to only approved destinations using firewall rules or access control lists.
  • Implement input validation on the API endpoint to accept only whitelisted URLs and reject or sanitize arbitrary addresses.
  • Continuously monitor web server and application logs for suspicious outbound requests and respond to anomalies.

Generated by OpenCVE AI on April 28, 2026 at 05:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Devlikeapro
Devlikeapro waha
Vendors & Products Devlikeapro
Devlikeapro waha

Mon, 27 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 25 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in devlikeapro WAHA up to 2026.3.4. This affects an unknown function of the file src/api/media.controller.ts of the component API Request Handler. This manipulation causes server-side request forgery. The attack can be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title devlikeapro WAHA API Request media.controller.ts server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Devlikeapro Waha
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T17:38:21.477Z

Reserved: 2026-04-24T18:55:19.562Z

Link: CVE-2026-6979

cve-icon Vulnrichment

Updated: 2026-04-27T17:38:05.163Z

cve-icon NVD

Status : Deferred

Published: 2026-04-25T12:15:59.423

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-6979

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T05:45:23Z

Weaknesses