CVE-2026-0600 PUBLISHED

Nexus Repository 3 - Server-Side Request Forgery in Proxy Repository Configuration

Assigner: Sonatype
Reserved: 05.01.2026 Published: 14.01.2026 Updated: 15.01.2026

Server-Side Request Forgery (SSRF) vulnerability in Sonatype Nexus Repository 3 versions 3.0.0 and later allows authenticated administrators to configure proxy repositories with URLs that can access unintended network destinations, potentially including cloud metadata services and internal network resources. A workaround configuration is available starting in version 3.88.0, but the product remains vulnerable by default.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N
CVSS Score: 6.2

Product Status

Vendor Sonatype
Product Nexus Repository
Versions Default: unaffected
  • affected from 3.0.0 to * (excl.)

Workarounds

Starting in version 3.88.0, administrators can configure the private network validation setting to block proxy repositories from accessing private network destinations. Cloud metadata endpoints (169.254.169.254) are always blocked regardless of configuration. See the security documentation at https://help.sonatype.com/en/securing-nexus-repository-manager.html for detailed configuration steps.

Credits

  • Kazuma Matsumoto of GMO Cybersecurity by IERAE, Inc. finder

References

Problem Types

  • CWE-918 Server-Side Request Forgery (SSRF) CWE