๐Ÿ” CVE Alert

CVE-2026-28677

HIGH 8.2

OpenSift: Insufficient URL destination restrictions in ingest flow could enable SSRF-style internal access

CVSS Score
8.2
EPSS Score
0.0%
EPSS Percentile
0th

OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Prior to version 1.6.3-alpha, the URL ingest pipeline accepted user-controlled remote URLs with incomplete destination restrictions. Although private/local host checks existed, missing restrictions for credentialed URLs, non-standard ports, and cross-host redirects left SSRF-class abuse paths in non-localhost deployments. This issue has been patched in version 1.6.3-alpha.

CWE CWE-918
Vendor opensift
Product opensift
Published Mar 6, 2026
Last Updated Mar 6, 2026
Stay Ahead of the Next One

Get instant alerts for opensift opensift

Be the first to know when new high vulnerabilities affecting opensift opensift are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
Low

Affected Versions

OpenSift / OpenSift
< 1.6.3-alpha

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/OpenSift/OpenSift/security/advisories/GHSA-5jfc-p787-2mf9 github.com: https://github.com/OpenSift/OpenSift/pull/67 github.com: https://github.com/OpenSift/OpenSift/commit/1126e0a503876056a68a434e19f64158a5a4840b github.com: https://github.com/OpenSift/OpenSift/commit/de99b9c github.com: https://github.com/OpenSift/OpenSift/releases/tag/v1.6.3-alpha