CVE-2026-28677

high

Description

OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Prior to version 1.6.3-alpha, the URL ingest pipeline accepted user-controlled remote URLs with incomplete destination restrictions. Although private/local host checks existed, missing restrictions for credentialed URLs, non-standard ports, and cross-host redirects left SSRF-class abuse paths in non-localhost deployments. This issue has been patched in version 1.6.3-alpha.

References

https://github.com/OpenSift/OpenSift/security/advisories/GHSA-5jfc-p787-2mf9

https://github.com/OpenSift/OpenSift/releases/tag/v1.6.3-alpha

https://github.com/OpenSift/OpenSift/pull/67

https://github.com/OpenSift/OpenSift/commit/de99b9c

https://github.com/OpenSift/OpenSift/commit/1126e0a503876056a68a434e19f64158a5a4840b

Details

Source: Mitre, NVD

Published: 2026-03-06

Updated: 2026-03-06

Risk Information

CVSS v2

Base Score: 8.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:P

Severity: High

CVSS v3

Base Score: 8.2

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L

Severity: High

EPSS

EPSS: 0.00044