CVE-2026-32279 (GCVE-0-2026-32279)
Vulnerability from cvelistv5 – Published: 2026-03-23 21:36 – Updated: 2026-03-24 13:40
VLAI?
Title
Connect CMS has SSRF in the External Page Migration Feature of its Page Management Plugin
Summary
Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, a Server-Side Request Forgery (SSRF) issue exists in the external page migration feature of the Page Management Plugin. Versions 1.41.1 and 2.41.1 contain a patch.
Severity ?
6.8 (Medium)
CWE
- CWE-918 - Server-Side Request Forgery (SSRF)
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| opensource-workshop | connect-cms |
Affected:
< 1.41.1
Affected: >= 2.0.0, < 2.41.1 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-32279",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-24T13:39:02.866404Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-24T13:40:01.660Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "connect-cms",
"vendor": "opensource-workshop",
"versions": [
{
"status": "affected",
"version": "\u003c 1.41.1"
},
{
"status": "affected",
"version": "\u003e= 2.0.0, \u003c 2.41.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, a Server-Side Request Forgery (SSRF) issue exists in the external page migration feature of the Page Management Plugin. Versions 1.41.1 and 2.41.1 contain a patch."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-918",
"description": "CWE-918: Server-Side Request Forgery (SSRF)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-23T21:36:22.473Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/opensource-workshop/connect-cms/security/advisories/GHSA-jh46-85jr-6ph9",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/opensource-workshop/connect-cms/security/advisories/GHSA-jh46-85jr-6ph9"
},
{
"name": "https://github.com/opensource-workshop/connect-cms/commit/4a1a64a8f768a53e06a4239e25782d9e2e88fc63",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/opensource-workshop/connect-cms/commit/4a1a64a8f768a53e06a4239e25782d9e2e88fc63"
},
{
"name": "https://github.com/opensource-workshop/connect-cms/commit/617a874e14b8476da7c0760a06384b9da21bdd4f",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/opensource-workshop/connect-cms/commit/617a874e14b8476da7c0760a06384b9da21bdd4f"
},
{
"name": "https://github.com/opensource-workshop/connect-cms/releases/tag/v1.41.1",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/opensource-workshop/connect-cms/releases/tag/v1.41.1"
},
{
"name": "https://github.com/opensource-workshop/connect-cms/releases/tag/v2.41.1",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/opensource-workshop/connect-cms/releases/tag/v2.41.1"
}
],
"source": {
"advisory": "GHSA-jh46-85jr-6ph9",
"discovery": "UNKNOWN"
},
"title": "Connect CMS has SSRF in the External Page Migration Feature of its Page Management Plugin"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2026-32279",
"datePublished": "2026-03-23T21:36:22.473Z",
"dateReserved": "2026-03-11T15:05:48.401Z",
"dateUpdated": "2026-03-24T13:40:01.660Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-32279",
"date": "2026-04-15",
"epss": "0.00046",
"percentile": "0.14005"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-32279\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2026-03-23T22:16:27.617\",\"lastModified\":\"2026-03-24T20:28:36.733\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, a Server-Side Request Forgery (SSRF) issue exists in the external page migration feature of the Page Management Plugin. Versions 1.41.1 and 2.41.1 contain a patch.\"},{\"lang\":\"es\",\"value\":\"Connect-CMS es un sistema de gesti\u00f3n de contenidos. En las versiones de la serie 1.x hasta la 1.41.0 inclusive y las versiones de la serie 2.x hasta la 2.41.0 inclusive, existe un problema de falsificaci\u00f3n de petici\u00f3n del lado del servidor (SSRF) en la funci\u00f3n de migraci\u00f3n de p\u00e1ginas externas del plugin de Gesti\u00f3n de P\u00e1ginas. Las versiones 1.41.1 y 2.41.1 contienen un parche.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":4.0}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-918\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensource-workshop:connect-cms:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0.0\",\"versionEndExcluding\":\"1.41.1\",\"matchCriteriaId\":\"60B8BBDF-82BD-486D-AE17-7F59360E62C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensource-workshop:connect-cms:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.0.0\",\"versionEndExcluding\":\"2.41.1\",\"matchCriteriaId\":\"0C11B4F0-DF29-473A-A285-9DA152DDCDE1\"}]}]}],\"references\":[{\"url\":\"https://github.com/opensource-workshop/connect-cms/commit/4a1a64a8f768a53e06a4239e25782d9e2e88fc63\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/opensource-workshop/connect-cms/commit/617a874e14b8476da7c0760a06384b9da21bdd4f\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/opensource-workshop/connect-cms/releases/tag/v1.41.1\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/opensource-workshop/connect-cms/releases/tag/v2.41.1\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/opensource-workshop/connect-cms/security/advisories/GHSA-jh46-85jr-6ph9\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-32279\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-24T13:39:02.866404Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-24T13:39:53.756Z\"}}], \"cna\": {\"title\": \"Connect CMS has SSRF in the External Page Migration Feature of its Page Management Plugin\", \"source\": {\"advisory\": \"GHSA-jh46-85jr-6ph9\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 6.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"opensource-workshop\", \"product\": \"connect-cms\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 1.41.1\"}, {\"status\": \"affected\", \"version\": \"\u003e= 2.0.0, \u003c 2.41.1\"}]}], \"references\": [{\"url\": \"https://github.com/opensource-workshop/connect-cms/security/advisories/GHSA-jh46-85jr-6ph9\", \"name\": \"https://github.com/opensource-workshop/connect-cms/security/advisories/GHSA-jh46-85jr-6ph9\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/opensource-workshop/connect-cms/commit/4a1a64a8f768a53e06a4239e25782d9e2e88fc63\", \"name\": \"https://github.com/opensource-workshop/connect-cms/commit/4a1a64a8f768a53e06a4239e25782d9e2e88fc63\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/opensource-workshop/connect-cms/commit/617a874e14b8476da7c0760a06384b9da21bdd4f\", \"name\": \"https://github.com/opensource-workshop/connect-cms/commit/617a874e14b8476da7c0760a06384b9da21bdd4f\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/opensource-workshop/connect-cms/releases/tag/v1.41.1\", \"name\": \"https://github.com/opensource-workshop/connect-cms/releases/tag/v1.41.1\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/opensource-workshop/connect-cms/releases/tag/v2.41.1\", \"name\": \"https://github.com/opensource-workshop/connect-cms/releases/tag/v2.41.1\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, a Server-Side Request Forgery (SSRF) issue exists in the external page migration feature of the Page Management Plugin. Versions 1.41.1 and 2.41.1 contain a patch.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-918\", \"description\": \"CWE-918: Server-Side Request Forgery (SSRF)\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2026-03-23T21:36:22.473Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-32279\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-24T13:40:01.660Z\", \"dateReserved\": \"2026-03-11T15:05:48.401Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2026-03-23T21:36:22.473Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…