๐Ÿ” CVE Alert

CVE-2026-42858

HIGH 8.5

Open edX Platform: Server-Side Request Forgery (SSRF) in SAML Provider Data Sync Endpoint

CVSS Score
8.5
EPSS Score
0.0%
EPSS Percentile
8th

Open edX Platform enables the authoring and delivery of online learning at any scale. The sync_provider_data endpoint in SAMLProviderDataViewSet allows authenticated Enterprise Admin users to supply an arbitrary URL via the metadata_url POST parameter. This URL is passed directly to requests.get() in fetch_metadata_xml() without any URL validation, IP filtering, or scheme enforcement. An attacker with Enterprise Admin privileges can force the server to make HTTP requests to internal network services, cloud metadata endpoints (e.g., AWS 169.254.169.254), or other attacker-controlled destinations. This vulnerability is fixed by commit 6fda1f120ff5a590d120ae1180185525f399c6d0 and 70a56246dd9c9df57c596e64bdd8a11b1d9da054.

CWE CWE-918
Vendor openedx
Product openedx-platform
Published May 11, 2026
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for openedx openedx-platform

Be the first to know when new high vulnerabilities affecting openedx openedx-platform are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
Low
Availability
None

Affected Versions

openedx / openedx-platform
< 6fda1f120ff5a590d120ae1180185525f399c6d0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openedx/openedx-platform/security/advisories/GHSA-328g-7h4g-r2m9 github.com: https://github.com/openedx/openedx-platform/commit/6fda1f120ff5a590d120ae1180185525f399c6d0 github.com: https://github.com/openedx/openedx-platform/commit/70a56246dd9c9df57c596e64bdd8a11b1d9da054