๐Ÿ” CVE Alert

CVE-2026-42860

HIGH 8.5

Open edx Enterprise Service: SSRF via SAML metadata URL in sync_provider_data endpoint

CVSS Score
8.5
EPSS Score
0.0%
EPSS Percentile
0th

The Open edx Enterprise Service app provides enterprise features to the Open edX platform. From 7.0.2 to 7.0.4, the sync_provider_data endpoint in SAMLProviderDataViewSet fetches SAML metadata from a URL stored in SAMLProviderConfig.metadata_source. An authenticated user with the Enterprise Admin role can set this field to an arbitrary URL via the SAMLProviderConfigViewSet PATCH endpoint, then trigger a server-side HTTP request by calling sync_provider_data. The fetch in fetch_metadata_xml() passes the URL directly to requests.get() with no scheme enforcement, IP filtering, or timeout. This vulnerability is fixed in 7.0.5.

CWE CWE-918
Vendor openedx
Product edx-enterprise
Published May 11, 2026
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for openedx edx-enterprise

Be the first to know when new high vulnerabilities affecting openedx edx-enterprise are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
Low
Availability
None

Affected Versions

openedx / edx-enterprise
>= 7.0.2, < 7.0.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openedx/edx-enterprise/security/advisories/GHSA-64cv-vxpr-j6vc