Project Subscriptions
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3c45-4pj5-ch7m | changedetection.io is Vulnerable to SSRF via Watch URLs |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 26 Feb 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Webtechnologies
Webtechnologies changedetection |
|
| CPEs | cpe:2.3:a:webtechnologies:changedetection:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Webtechnologies
Webtechnologies changedetection |
Thu, 26 Feb 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Feb 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dgtlmoon
Dgtlmoon changedetection.io |
|
| Vendors & Products |
Dgtlmoon
Dgtlmoon changedetection.io |
Wed, 25 Feb 2026 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | changedetection.io is a free open source web page change detection tool. In versions prior to 0.54.1, changedetection.io is vulnerable to Server-Side Request Forgery (SSRF) because the URL validation function `is_safe_valid_url()` does not validate the resolved IP address of watch URLs against private, loopback, or link-local address ranges. An authenticated user (or any user when no password is configured, which is the default) can add a watch for internal network URLs. The application fetches these URLs server-side, stores the response content, and makes it viewable through the web UI — enabling full data exfiltration from internal services. Version 0.54.1 contains a fix for the issue. | |
| Title | changedetection.io Vulnerable to Server-Side Request Forgery (SSRF) via Watch URLs | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-25T14:51:16.695Z
Reserved: 2026-02-23T17:56:51.202Z
Link: CVE-2026-27696
Updated: 2026-02-25T14:51:11.760Z
Status : Analyzed
Published: 2026-02-25T05:17:26.940
Modified: 2026-02-26T15:34:26.273
Link: CVE-2026-27696
No data.
OpenCVE Enrichment
Updated: 2026-02-25T11:34:36Z
Github GHSA