Description
A vulnerability was found in IhateCreatingUserNames2 AiraHub2 up to 3e4b77fd7d48ed811ffe5b8d222068c17c76495e. Affected is the function connect_stream_endpoint/sync_agents of the file AiraHub.py of the component Endpoint. Performing a manipulation results in server-side request forgery. The attack may be initiated remotely. The exploit has been made public and could be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. Multiple endpoints are affected. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-25
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Patch ASAP
AI Analysis

Impact

AiraHub2’s sync_agents endpoint can be manipulated to force the server to send arbitrary HTTP requests to external or internal resources. The vulnerability enables an attacker to trigger requests from the server’s network context, potentially accessing sensitive services or data that the server can reach. The attack may be launched remotely and the exploit has been made public, raising the risk of abuse.

Affected Systems

The flaw exists in all releases of IhateCreatingUserNames2 AiraHub2 up to the commit d7d48ed811ffe5b8d222068c17c76495e. Because the vendor uses a rolling‑release model, specific fixed version information is not yet available. All deployments that have not yet incorporated the vendor’s latest update are vulnerable.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate impact, while the EPSS score of less than 1% suggests a low but non‑zero likelihood of exploitation today. The vulnerability is not listed in CISA’s KEV catalog. An attacker can craft a request to the sync_agents endpoint to provoke the server‑side request forgery; the attack can be performed remotely without authentication. The vendor’s lack of response and the public nature of the exploit elevate the urgency of remediation.

Generated by OpenCVE AI on April 28, 2026 at 19:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update AiraHub2 to the latest release as soon as the vendor publishes a fix.
  • If an updated release is not yet available, restrict external access to the sync_agents endpoint; allow traffic only from trusted IP addresses or networks through firewall rules.
  • Implement outbound request filtering or network segmentation so that the application can make only the necessary outbound connections, limiting the potential impact of a server‑side request forgery.

Generated by OpenCVE AI on April 28, 2026 at 19:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Ihatecreatingusernames2
Ihatecreatingusernames2 airahub2
Vendors & Products Ihatecreatingusernames2
Ihatecreatingusernames2 airahub2

Mon, 27 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 25 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in IhateCreatingUserNames2 AiraHub2 up to 3e4b77fd7d48ed811ffe5b8d222068c17c76495e. Affected is the function connect_stream_endpoint/sync_agents of the file AiraHub.py of the component Endpoint. Performing a manipulation results in server-side request forgery. The attack may be initiated remotely. The exploit has been made public and could be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. Multiple endpoints are affected. The vendor was contacted early about this disclosure but did not respond in any way.
Title IhateCreatingUserNames2 AiraHub2 Endpoint AiraHub.py sync_agents server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Ihatecreatingusernames2 Airahub2
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T13:36:45.566Z

Reserved: 2026-04-24T18:58:54.878Z

Link: CVE-2026-6981

cve-icon Vulnrichment

Updated: 2026-04-27T13:36:32.878Z

cve-icon NVD

Status : Deferred

Published: 2026-04-25T15:16:17.643

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-6981

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T20:00:19Z

Weaknesses