CVE-2026-41171 PUBLISHED

SSRF via Jint Scripting Engine HTTP Functions Due to Missing SSRF Protection on "Jint" HttpClient

Assigner: GitHub_M
Reserved: 17.04.2026 Published: 22.04.2026 Updated: 22.04.2026

Squidex is an open source headless content management system and content management hub. Versions prior to 7.23.0 have a Server-Side Request Forgery (SSRF) vulnerability due to missing SSRF protection on the Jint HTTP client used by scripting engine functions (getJSON, request, etc.). An authenticated user with low privileges (e.g., schema editing permissions) can force the server to make arbitrary outbound HTTP requests to attacker-controlled or internal endpoints. This allows access to internal services and cloud metadata endpoints (e.g., IMDS), potentially leading to credential exposure and lateral movement. Version 7.23.0 contains a fix.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P
CVSS Score: 7.3

Product Status

Vendor Squidex
Product squidex
Versions
  • Version < 7.23.0 is affected

References

Problem Types

  • CWE-918: Server-Side Request Forgery (SSRF) CWE