CVE-2026-39361 PUBLISHED

OpenObserve has a SSRF Protection Bypass via IPv6 Bracket Notation in validate_enrichment_url

Assigner: GitHub_M
Reserved: 06.04.2026 Published: 07.04.2026 Updated: 07.04.2026

OpenObserve is a cloud-native observability platform. In 0.70.3 and earlier, the validate_enrichment_url function in src/handler/http/request/enrichment_table/mod.rs fails to block IPv6 addresses because Rust's url crate returns them with surrounding brackets (e.g. "[::1]" not "::1"). An authenticated attacker can reach internal services blocked from external access. On cloud deployments this enables retrieval of IAM credentials via AWS IMDSv1 (169.254.169.254), GCP metadata, or Azure IMDS. On self-hosted deployments it allows probing internal network services.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
CVSS Score: 7.7

Product Status

Vendor openobserve
Product openobserve
Versions
  • Version <= 0.70.3 is affected

References

Problem Types

  • CWE-918: Server-Side Request Forgery (SSRF) CWE