CVE-2026-40089 PUBLISHED

Sonicverse has Server-Side Request Forgery via user-controlled URLs in dashboard API client

Assigner: GitHub_M
Reserved: 09.04.2026 Published: 09.04.2026 Updated: 09.04.2026

Sonicverse is a Self-hosted Docker Compose stack for live radio streaming. The Sonicverse Radio Audio Streaming Stack dashboard contains a Server-Side Request Forgery (SSRF) vulnerability in its API client (apps/dashboard/lib/api.ts). Installations created using the provided install.sh script (including the one‑liner bash <(curl -fsSL https://sonicverse.short.gy/install-audiostack)) are affected. In these deployments, the dashboard accepts user-controlled URLs and passes them directly to a server-side HTTP client without sufficient validation. An authenticated operator can abuse this to make arbitrary HTTP requests from the dashboard backend to internal or external systems. This vulnerability is fixed with commit cb1ddbacafcb441549fe87d3eeabdb6a085325e4.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
CVSS Score: 9.9

Product Status

Vendor sonicverse-eu
Product audiostreaming-stack
Versions
  • Version < cb1ddbacafcb441549fe87d3eeabdb6a085325e4 is affected

References

Problem Types

  • CWE-918: Server-Side Request Forgery (SSRF) CWE