๐Ÿ” CVE Alert

CVE-2026-41177

MEDIUM 5.5

Squidex has Blind SSRF via file:// Protocol in Restore API leading to Local File Interaction

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

Squidex is an open source headless content management system and content management hub. Prior to version 7.23.0, the Squidex Restore API is vulnerable to Blind Server-Side Request Forgery (SSRF). The application fails to validate the URI scheme of the user-supplied `Url` parameter, allowing the use of the `file://` protocol. This allows an authenticated administrator to force the backend server to interact with the local filesystem, which can lead to Local File Interaction (LFI) and potential disclosure of sensitive system information through side-channel analysis of internal logs. Version 7.23.0 contains a fix.

CWE CWE-73 CWE-918
Vendor squidex
Product squidex
Published Apr 22, 2026
Stay Ahead of the Next One

Get instant alerts for squidex squidex

Be the first to know when new medium vulnerabilities affecting squidex squidex are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
Low

Affected Versions

Squidex / squidex
< 7.23.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/Squidex/squidex/security/advisories/GHSA-45fq-w37p-qfw5 github.com: https://github.com/Squidex/squidex/commit/b81d75e1d9c1a8e30993c2ee59b350002b9aeda4