CVE-2026-39922
GeoNode SSRF via Service Registration
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
11th
GeoNode versions 4.4.5 and 5.0.2 (and prior within their respective releases) contain a server-side request forgery vulnerability in the service registration endpoint that allows authenticated attackers to trigger outbound network requests to arbitrary URLs by submitting a crafted service URL during form validation. Attackers can probe internal network targets including loopback addresses, RFC1918 private IP ranges, link-local addresses, and cloud metadata services by exploiting insufficient URL validation in the WMS service handler without private IP filtering or allowlist enforcement.
| CWE | CWE-918 |
| Vendor | geonode |
| Product | geonode |
| Published | Apr 10, 2026 |
| Last Updated | Apr 16, 2026 |
Stay Ahead of the Next One
Get instant alerts for geonode geonode
Be the first to know when new unknown vulnerabilities affecting geonode geonode are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
GeoNode / GeoNode
4.0 โค 4.4.5 5.0 โค 5.0.2
References
Credits
Elure (Marasescu Mihnea-Luca)