CVE-2026-28677 PUBLISHED

OpenSift: Insufficient URL destination restrictions in ingest flow could enable SSRF-style internal access

Assigner: GitHub_M
Reserved: 02.03.2026 Published: 06.03.2026 Updated: 06.03.2026

OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Prior to version 1.6.3-alpha, the URL ingest pipeline accepted user-controlled remote URLs with incomplete destination restrictions. Although private/local host checks existed, missing restrictions for credentialed URLs, non-standard ports, and cross-host redirects left SSRF-class abuse paths in non-localhost deployments. This issue has been patched in version 1.6.3-alpha.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
CVSS Score: 8.2

Product Status

Vendor OpenSift
Product OpenSift
Versions
  • Version < 1.6.3-alpha is affected

References

Problem Types

  • CWE-918: Server-Side Request Forgery (SSRF) CWE