CVE-2026-44363: SSRF in MISP Modules Expansion

Platform

python

Component

misp-modules

Fixed in

3.0.7

CVE-2026-44363 describes an unsafe remote resource fetching vulnerability found within the MISP Modules expansion for the MISP platform. This flaw allows attackers to potentially perform Server-Side Request Forgery (SSRF), enabling them to access internal network resources. The vulnerability impacts MISP installations using versions up to 3.0.7, and a fix has been implemented by enhancing URL validation and restricting access to sensitive network ranges.

Python

Detect this CVE in your project

Upload your requirements.txt file and we'll tell you instantly if you're affected.

Upload requirements.txtSupported formats: requirements.txt · Pipfile.lock

Impact and Attack Scenarios

The SSRF vulnerability in MISP Modules allows an attacker to craft malicious requests that originate from the MISP server itself. This bypasses typical network security controls, as the request appears to come from a trusted internal source. Specifically, the htmltomarkdown module's lack of URL validation permits requests to arbitrary HTTP(S) URLs, including those within loopback, private, or link-local network ranges. This could expose sensitive data residing on internal servers, such as configuration files, databases, or internal web applications. The qrcode module's disabled TLS certificate verification further exacerbates the risk, opening the door to man-in-the-middle attacks where an attacker can intercept and tamper with responses. Successful exploitation could lead to unauthorized access to internal systems and data, potentially compromising the entire MISP deployment and connected network segments.

Exploitation Context

CVE-2026-44363 was published on 2026-05-06. The EPSS score is pending evaluation, indicating the likelihood of exploitation is currently unknown. No public Proof-of-Concept (PoC) exploits have been publicly disclosed at the time of writing. The vulnerability is not currently listed on CISA Known Exploited Vulnerabilities (KEV) catalog. Monitor security advisories and threat intelligence feeds for any indications of active exploitation campaigns.

Threat Intelligence

Exploit Status

Proof of ConceptUnknown
CISA KEVNO

CISA SSVC

Exploitationnone
Automatableno
Technical Impactpartial

Affected Software

Componentmisp-modules
VendorMISP
Minimum version3.0.0
Maximum version< 3.0.7
Fixed in3.0.7

Weakness Classification (CWE)

Timeline

  1. Reserved
  2. Published
  3. Modified

Mitigation and Workarounds

To mitigate CVE-2026-44363, upgrading to a patched version of MISP Modules is the primary recommendation. The fix involves rigorous URL scheme validation, blocking access to local and private address ranges, and resolving hostnames before fetching resources. If immediate upgrading is not feasible, consider implementing temporary workarounds. Restrict network access to the MISP server to only necessary resources. Implement a Web Application Firewall (WAF) or proxy with SSRF protection rules to filter out malicious requests. Carefully review and restrict the URLs that the htmltomarkdown module is allowed to access. After upgrading, confirm the fix by attempting to access a known internal resource via the htmltomarkdown module; the request should be blocked.

How to fix

Actualice el módulo MISP a la versión 3.0.7 o superior para mitigar la vulnerabilidad. Esta versión incluye validaciones de URL, bloqueo de direcciones locales y privadas, resolución de nombres de host antes de la obtención, tiempos de espera de solicitud y re-habilitación de la verificación de certificados TLS.

Frequently asked questions

What is CVE-2026-44363 in misp-modules?

It's a Server-Side Request Forgery (SSRF) vulnerability in MISP Modules expansion, allowing attackers to access internal resources from the MISP server.

Am I affected by CVE-2026-44363 in misp-modules?

If you are using MISP Modules version 3.0.7 or earlier, you are potentially affected by this vulnerability. Check your MISP version immediately.

How do I fix CVE-2026-44363 in misp-modules?

Upgrade to a patched version of MISP Modules that includes the URL validation and access restriction fixes. Consider temporary workarounds like WAF rules if immediate upgrade isn't possible.

Is CVE-2026-44363 being actively exploited?

No public exploits are currently known, and it's not listed on CISA KEV. However, SSRF vulnerabilities are often targeted, so vigilance is important.

Where can I find the official misp-modules advisory for CVE-2026-44363?

Refer to the MISP security advisories and the official CVE entry for detailed information: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-44363

Is your project affected?

Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.

Python

Detect this CVE in your project

Upload your requirements.txt file and we'll tell you instantly if you're affected.

Upload requirements.txtSupported formats: requirements.txt · Pipfile.lock
livefree scan

Scan your Python project now — no account

Upload your requirements.txt and get the vulnerability report instantly. No account. Uploading the file is just the start: with an account you get continuous monitoring, Slack/email alerts, multi-project and white-label reports.

Manual scanSlack/email alertsContinuous monitoringWhite-label reports

Drag & drop your dependency file

composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...