OpenObserve is a cloud-native observability platform. In 0.70.3 and earlier, the validate_enrichment_url function in src/handler/http/request/enrichment_table/mod.rs fails to block IPv6 addresses because Rust's url crate returns them with surrounding brackets (e.g. "[::1]" not "::1"). An authenticated attacker can reach internal services blocked from external access. On cloud deployments this enables retrieval of IAM credentials via AWS IMDSv1 (169.254.169.254), GCP metadata, or Azure IMDS. On self-hosted deployments it allows probing internal network services.
History

Thu, 09 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Openobserve
Openobserve openobserve
Vendors & Products Openobserve
Openobserve openobserve

Tue, 07 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description OpenObserve is a cloud-native observability platform. In 0.70.3 and earlier, the validate_enrichment_url function in src/handler/http/request/enrichment_table/mod.rs fails to block IPv6 addresses because Rust's url crate returns them with surrounding brackets (e.g. "[::1]" not "::1"). An authenticated attacker can reach internal services blocked from external access. On cloud deployments this enables retrieval of IAM credentials via AWS IMDSv1 (169.254.169.254), GCP metadata, or Azure IMDS. On self-hosted deployments it allows probing internal network services.
Title OpenObserve has a SSRF Protection Bypass via IPv6 Bracket Notation in validate_enrichment_url
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2026-04-07T19:02:12.816Z

Updated: 2026-04-09T16:17:46.139Z

Reserved: 2026-04-06T21:29:17.349Z

Link: CVE-2026-39361

cve-icon Vulnrichment

Updated: 2026-04-09T15:04:30.587Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-07T20:16:29.837

Modified: 2026-04-09T17:16:28.093

Link: CVE-2026-39361

cve-icon Redhat

No data.