CVE-2026-35036
Ech0 Affected by Unauthenticated Server-Side Request Forgery in Website Preview Feature
Ech0 is an open-source, self-hosted publishing platform for personal idea sharing. Prior to 4.2.8, Ech0 implements link preview (editor fetches a page title) through GET /api/website/title. That is legitimate product behavior, but the implementation is unsafe: the route is unauthenticated, accepts a fully attacker-controlled URL, performs a server-side GET, reads the entire response body into memory (io.ReadAll). There is no host allowlist, no SSRF filter, and InsecureSkipVerify: true on the outbound client. Anyone who can reach the instance can force the Ech0 server to open HTTP/HTTPS URLs of their choice as seen from the serverβs network position (Docker bridge, VPC, localhost from the process view). This vulnerability is fixed in 4.2.8.
| CWE | CWE-918 |
| Vendor | lin-snow |
| Product | ech0 |
| Published | Apr 6, 2026 |
| Last Updated | Apr 7, 2026 |
Get instant alerts for lin-snow ech0
Be the first to know when new high vulnerabilities affecting lin-snow ech0 are published β delivered to Slack, Telegram or Discord.
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N