Unrated severityNVD Advisory· Published Mar 6, 2026· Updated Mar 6, 2026
OpenSift: Insufficient URL destination restrictions in ingest flow could enable SSRF-style internal access
CVE-2026-28677
Description
OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Prior to version 1.6.3-alpha, the URL ingest pipeline accepted user-controlled remote URLs with incomplete destination restrictions. Although private/local host checks existed, missing restrictions for credentialed URLs, non-standard ports, and cross-host redirects left SSRF-class abuse paths in non-localhost deployments. This issue has been patched in version 1.6.3-alpha.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/OpenSift/OpenSift/commit/1126e0a503876056a68a434e19f64158a5a4840bmitrex_refsource_MISC
- github.com/OpenSift/OpenSift/commit/de99b9cmitrex_refsource_MISC
- github.com/OpenSift/OpenSift/pull/67mitrex_refsource_MISC
- github.com/OpenSift/OpenSift/releases/tag/v1.6.3-alphamitrex_refsource_MISC
- github.com/OpenSift/OpenSift/security/advisories/GHSA-5jfc-p787-2mf9mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.