Description
A security flaw has been discovered in calcom cal.diy up to 4.9.4. The affected element is the function validateUrlForSSRF of the file apps/web/app/api/logo/route.ts of the component Logo API. The manipulation results in server-side request forgery. It is possible to launch the attack remotely. Attacks of this nature are highly complex. The exploitability is described as difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-23
Score: 2.3 Low
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw lies in the validateUrlForSSRF function of the Logo API route in calcom cal.diy. By manipulating the input URL, an attacker can trigger the server to make HTTP(s) requests to arbitrary addresses, potentially exposing internal services or data. The primary impact is the ability to reach and read internal resources that the application is otherwise allowed to access, which can lead to further exploitation depending on the environment exposed by the SSRF.

Affected Systems

Calcom’s cal.diy product, versions up to and including 4.9.4, is affected. No newer versions are known to contain the fix as of the presented data.

Risk and Exploitability

The CVSS score of 2.3 reflects a low overall severity; EPSS data is unavailable, and the vulnerability is not listed in the CISA KEV catalog. Though exploitation is described as difficult, a public exploit has already been released, indicating that an attacker could use it in a remote setting. The risk to an organization primarily stems from potential internal network exposure, and mitigation should focus on restricting outbound connections and ensuring the application is updated.

Generated by OpenCVE AI on May 23, 2026 at 15:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade calcom cal.diy to a version later than 4.9.4 that removes the validateUrlForSSRF function.
  • Configure the server to restrict outbound HTTP(S) connections by whitelisting approved destinations or placing the application behind a proxy that filters outbound requests.
  • Monitor application logs for unexpected outbound traffic and investigate any anomalies promptly.

Generated by OpenCVE AI on May 23, 2026 at 15:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 23 May 2026 14:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in calcom cal.diy up to 4.9.4. The affected element is the function validateUrlForSSRF of the file apps/web/app/api/logo/route.ts of the component Logo API. The manipulation results in server-side request forgery. It is possible to launch the attack remotely. Attacks of this nature are highly complex. The exploitability is described as difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title calcom cal.diy Logo API route.ts validateUrlForSSRF server-side request forgery
First Time appeared Calcom
Calcom cal.diy
Weaknesses CWE-918
CPEs cpe:2.3:a:calcom:cal.diy:*:*:*:*:*:*:*:*
Vendors & Products Calcom
Calcom cal.diy
References
Metrics cvssV2_0

{'score': 4.6, 'vector': 'AV:N/AC:H/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-23T13:45:08.165Z

Reserved: 2026-05-22T17:54:42.546Z

Link: CVE-2026-9304

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-23T15:30:20Z

Weaknesses