Vulnerability Description
OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Prior to version 1.6.3-alpha, the URL ingest pipeline accepted user-controlled remote URLs with incomplete destination restrictions. Although private/local host checks existed, missing restrictions for credentialed URLs, non-standard ports, and cross-host redirects left SSRF-class abuse paths in non-localhost deployments. This issue has been patched in version 1.6.3-alpha.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opensift | Opensift | < 1.6.3 |
Related Weaknesses (CWE)
References
- https://github.com/OpenSift/OpenSift/commit/1126e0a503876056a68a434e19f64158a5a4Patch
- https://github.com/OpenSift/OpenSift/commit/de99b9cPatch
- https://github.com/OpenSift/OpenSift/pull/67Issue TrackingPatch
- https://github.com/OpenSift/OpenSift/releases/tag/v1.6.3-alphaRelease Notes
- https://github.com/OpenSift/OpenSift/security/advisories/GHSA-5jfc-p787-2mf9Vendor AdvisoryPatch
FAQ
What is CVE-2026-28677?
CVE-2026-28677 is a vulnerability with a CVSS score of 8.2 (HIGH). OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Prior to version 1.6.3-alpha, the URL ingest pipeline accepted user-controlled remote URLs with ...
How severe is CVE-2026-28677?
CVE-2026-28677 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-28677?
Check the references section above for vendor advisories and patch information. Affected products include: Opensift Opensift.