Description
A weakness has been identified in CoreWorxLab CAAL up to 1.6.0. The affected element is an unknown function of the file src/caal/webhooks.py of the component test-hass Endpoint. This manipulation causes server-side request forgery. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-17
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

CoreWorxLab CAAL versions up to 1.6.0 contain an SSRF vulnerability in an undisclosed function of src/caal/webhooks.py within the test-hass Endpoint. The weakness allows a remote attacker to craft a request that makes the server perform arbitrary HTTP requests, which can lead to information disclosure, unauthorized actions on internal resources or further compromise of the network. The flaw is classified as CWE‑918 and the description notes that it is remotely exploitable and a public exploit has already been released.

Affected Systems

The affected product is CoreWorxLab CAAL, specifically all releases version 1.6.0 and earlier. The vulnerability resides in the test‑hass Endpoint component of the CAAL application.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is remote; an attacker can trigger the flaw by sending a crafted HTTP request to the webhook endpoint. Because a public exploit is available, the risk to unpatched installations is significant, especially if the server has unrestricted outbound connectivity.

Generated by OpenCVE AI on May 17, 2026 at 02:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a CAAL release that removes the SSRF flaw (if a newer version is available from CoreWorxLab).
  • If a patch is not presently available, disable or remove the test‑hass Endpoint to eliminate the vulnerable code path.
  • Restrict outbound traffic from the CAAL server to approved destinations only, using firewall rules or network ACLs, to limit the impact of any successful SSRF attempt.

Generated by OpenCVE AI on May 17, 2026 at 02:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 17 May 2026 01:30:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in CoreWorxLab CAAL up to 1.6.0. The affected element is an unknown function of the file src/caal/webhooks.py of the component test-hass Endpoint. This manipulation causes server-side request forgery. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title CoreWorxLab CAAL test-hass Endpoint webhooks.py server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-17T00:45:09.161Z

Reserved: 2026-05-16T09:37:32.730Z

Link: CVE-2026-8725

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-17T02:16:45.487

Modified: 2026-05-17T02:16:45.487

Link: CVE-2026-8725

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-17T02:30:36Z

Weaknesses