CVE-2026-39922
MEDIUM WAF: Medium
CVSS 6.3
Published: 2026-04-10
CWE-918
GeoNode versions 4.4.5 and 5.0.2 (and prior within their respective releases) contain a server-side request forgery vulnerability in the service registration endpoint that allows authenticated attackers to trigger outbound network requests to arbitrary URLs by submitting a crafted service URL during form validation. Attackers can probe internal network targets including loopback addresses, RFC1918 private IP ranges, link-local addresses, and cloud metadata services by exploiting insufficient URL validation in the WMS service handler without private IP filtering or allowlist enforcement.
WAF Coverage Analysis
Server-Side Request Forgery (SSRF)
Medium WAF Coverage
OWASP: A10:2021 SSRF
934xxx - Node.js / Generic Injection
Affected Software
| Vendor | Product | Version |
|---|---|---|
| geosolutionsgroup | geonode | 4.0.0 - 4.4.5 |
| geosolutionsgroup | geonode | 5.0.0 - 5.0.2 |
References
- github.com
- www.vulncheck.com (Third Party Advisory)