CVE-2026-41644 PUBLISHED

monetr is vulnerable to server-side request forgery in Lunch Flow link creation and refresh

Assigner: GitHub_M
Reserved: 21.04.2026 Published: 07.05.2026 Updated: 07.05.2026

monetr is a budgeting application for recurring expenses. Prior to version 1.12.5, a server-side request forgery (SSRF) vulnerability in monetr's Lunch Flow integration allowed any authenticated user on a self-hosted instance to cause the monetr server to issue HTTP GET requests to arbitrary URLs supplied by the caller, with the response body from non-200 upstream responses reflected back in the API error message. This issue has been patched in version 1.12.5.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:H/SI:N/SA:N
CVSS Score: 8.3

Product Status

Vendor monetr
Product monetr
Versions
  • Version < 1.12.5 is affected

References

Problem Types

  • CWE-209: Generation of Error Message Containing Sensitive Information CWE
  • CWE-770: Allocation of Resources Without Limits or Throttling CWE
  • CWE-918: Server-Side Request Forgery (SSRF) CWE