CVE-2026-42181 PUBLISHED

Lemmy: SSRF and internal image disclosure in post link metadata via unvalidated og:image

Assigner: GitHub_M
Reserved: 25.04.2026 Published: 08.05.2026 Updated: 08.05.2026

Lemmy is a link aggregator and forum for the fediverse. Prior to version 0.19.18, Lemmy fetches metadata for user-supplied post URLs and, under the default StoreLinkPreviews image mode, downloads the preview image through local pict-rs. While the top-level page URL is checked against internal IP ranges, the extracted og:image URL is not subject to the same restriction. As a result, an authenticated low-privileged user can submit an attacker-controlled public page whose Open Graph image points to an internal image endpoint. Lemmy will fetch that internal image server-side and store a local thumbnail that can then be served back to users. This issue has been patched in version 0.19.18.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS Score: 6.5

Product Status

Vendor LemmyNet
Product lemmy
Versions
  • Version < 0.19.18 is affected

References

Problem Types

  • CWE-918: Server-Side Request Forgery (SSRF) CWE