{"api_version":"1","generated_at":"2026-05-09T11:17:11+00:00","cve":"CVE-2026-42352","urls":{"html":"https://cve.report/CVE-2026-42352","api":"https://cve.report/api/cve/CVE-2026-42352.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-42352","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-42352"},"summary":{"title":"pygeoapi 0.23.x: Unauthenticated SSRF via OGC API - Processes Subscriber","description":"pygeoapi is a Python server implementation of the OGC API suite of standards. From version 0.23.0 to before version 0.23.3, OGC API  process execution requests can use the subscriber object to requests to internal HTTP services. This issue has been patched in version 0.23.3.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-05-08 23:16:38","updated_at":"2026-05-08 23:16:38"},"problem_types":["CWE-918","CWE-918 CWE-918: Server-Side Request Forgery (SSRF)"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"8.6","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"8.6","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.6,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N","version":"3.1"}}],"references":[{"url":"https://github.com/geopython/pygeoapi/commit/3a63f5b0cc6275e3ae0edb47726b13a43cdd90ef","name":"https://github.com/geopython/pygeoapi/commit/3a63f5b0cc6275e3ae0edb47726b13a43cdd90ef","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/geopython/pygeoapi/releases/tag/0.23.3","name":"https://github.com/geopython/pygeoapi/releases/tag/0.23.3","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/geopython/pygeoapi/security/advisories/GHSA-jgvc-94c8-3chc","name":"https://github.com/geopython/pygeoapi/security/advisories/GHSA-jgvc-94c8-3chc","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-42352","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42352","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"geopython","product":"pygeoapi","version":"affected >= 0.23.0, < 0.23.3","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"product":"pygeoapi","vendor":"geopython","versions":[{"status":"affected","version":">= 0.23.0, < 0.23.3"}]}],"descriptions":[{"lang":"en","value":"pygeoapi is a Python server implementation of the OGC API suite of standards. From version 0.23.0 to before version 0.23.3, OGC API  process execution requests can use the subscriber object to requests to internal HTTP services. This issue has been patched in version 0.23.3."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.6,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-918","description":"CWE-918: Server-Side Request Forgery (SSRF)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-08T22:31:50.110Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/geopython/pygeoapi/security/advisories/GHSA-jgvc-94c8-3chc","tags":["x_refsource_CONFIRM"],"url":"https://github.com/geopython/pygeoapi/security/advisories/GHSA-jgvc-94c8-3chc"},{"name":"https://github.com/geopython/pygeoapi/commit/3a63f5b0cc6275e3ae0edb47726b13a43cdd90ef","tags":["x_refsource_MISC"],"url":"https://github.com/geopython/pygeoapi/commit/3a63f5b0cc6275e3ae0edb47726b13a43cdd90ef"},{"name":"https://github.com/geopython/pygeoapi/releases/tag/0.23.3","tags":["x_refsource_MISC"],"url":"https://github.com/geopython/pygeoapi/releases/tag/0.23.3"}],"source":{"advisory":"GHSA-jgvc-94c8-3chc","discovery":"UNKNOWN"},"title":"pygeoapi 0.23.x: Unauthenticated SSRF via OGC API - Processes Subscriber"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-42352","datePublished":"2026-05-08T22:31:50.110Z","dateReserved":"2026-04-26T13:26:14.515Z","dateUpdated":"2026-05-08T22:31:50.110Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-08 23:16:38","lastModifiedDate":"2026-05-08 23:16:38","problem_types":["CWE-918","CWE-918 CWE-918: Server-Side Request Forgery (SSRF)"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":4}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"42352","Ordinal":"1","Title":"pygeoapi 0.23.x: Unauthenticated SSRF via OGC API - Processes Su","CVE":"CVE-2026-42352","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"42352","Ordinal":"1","NoteData":"pygeoapi is a Python server implementation of the OGC API suite of standards. From version 0.23.0 to before version 0.23.3, OGC API  process execution requests can use the subscriber object to requests to internal HTTP services. This issue has been patched in version 0.23.3.","Type":"Description","Title":"pygeoapi 0.23.x: Unauthenticated SSRF via OGC API - Processes Su"}]}}}