CVE-2026-39922 PUBLISHED

GeoNode < 4.4.5, 5.0.2 SSRF via Service Registration

Assigner: VulnCheck
Reserved: 07.04.2026 Published: 10.04.2026 Updated: 10.04.2026

GeoNode versions 4.0 before 4.4.5 and 5.0 before 5.0.2 contain a server-side request forgery vulnerability in the service registration endpoint that allows authenticated attackers to trigger outbound network requests to arbitrary URLs by submitting a crafted service URL during form validation. Attackers can probe internal network targets including loopback addresses, RFC1918 private IP ranges, link-local addresses, and cloud metadata services by exploiting insufficient URL validation in the WMS service handler without private IP filtering or allowlist enforcement.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:L
CVSS Score: 5.3

Product Status

Vendor GeoNode
Product GeoNode
Versions Default: unaffected
  • affected from 4.0 to 4.4.5 (excl.)
  • affected from 5.0 to 5.0.2 (excl.)

Credits

  • Elure (Marasescu Mihnea-Luca) finder

References

Problem Types

  • CWE-918 Server-Side Request Forgery (SSRF) CWE