Impact
CoreWorxLab CAAL versions up to 1.6.0 contain an SSRF vulnerability in an undisclosed function of src/caal/webhooks.py within the test-hass Endpoint. The weakness allows a remote attacker to craft a request that makes the server perform arbitrary HTTP requests, which can lead to information disclosure, unauthorized actions on internal resources or further compromise of the network. The flaw is classified as CWE‑918 and the description notes that it is remotely exploitable and a public exploit has already been released.
Affected Systems
The affected product is CoreWorxLab CAAL, specifically all releases version 1.6.0 and earlier. The vulnerability resides in the test‑hass Endpoint component of the CAAL application.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is remote; an attacker can trigger the flaw by sending a crafted HTTP request to the webhook endpoint. Because a public exploit is available, the risk to unpatched installations is significant, especially if the server has unrestricted outbound connectivity.
OpenCVE Enrichment