{
    "document": {
        "category": "csaf_base",
        "csaf_version": "2.0",
        "distribution": {
            "tlp": {
                "label": "WHITE"
            }
        },
        "lang": "en",
        "notes": [
            {
                "category": "legal_disclaimer",
                "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this portal to enhance access to its information and vulnerabilities. The use of this information is subject to the following terms and conditions:\n\nThe vulnerabilities disclosed in this portal are gathered by NCSC-NL from a variety of open sources, which the user can retrieve from other platforms. NCSC-NL makes every reasonable effort to ensure that the content of this portal is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or real-time keeping up-to-date. NCSC-NL does not control nor guarantee the accuracy, relevance, timeliness or completeness of information obtained from these external sources. The vulnerabilities disclosed in this portal are intended solely for the convenience of professional parties to take appropriate measures to manage the risks posed to the cybersecurity. No rights can be derived from the information provided therein.\n\nNCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of the vulnerabilities disclosed in this portal. This includes damage resulting from the inaccuracy of incompleteness of the information contained in it.\nThe information on this page is subject to Dutch law. All disputes related to or arising from the use of this portal regarding the disclosure of vulnerabilities will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
            }
        ],
        "publisher": {
            "category": "coordinator",
            "contact_details": "cert@ncsc.nl",
            "name": "National Cyber Security Centre",
            "namespace": "https://www.ncsc.nl/"
        },
        "title": "CVE-2026-26957",
        "tracking": {
            "current_release_date": "2026-03-22T17:52:36.451942Z",
            "generator": {
                "date": "2026-02-17T15:00:00Z",
                "engine": {
                    "name": "V.E.L.M.A",
                    "version": "1.7"
                }
            },
            "id": "CVE-2026-26957",
            "initial_release_date": "2026-02-18T01:39:38.889466Z",
            "revision_history": [
                {
                    "date": "2026-02-18T01:39:38.889466Z",
                    "number": "1",
                    "summary": "CVE created.| Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| References created (3).| CWES updated (1)."
                },
                {
                    "date": "2026-02-18T01:39:49.623078Z",
                    "number": "2",
                    "summary": "NCSC Score created."
                },
                {
                    "date": "2026-02-18T06:12:35.328538Z",
                    "number": "3",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| Products created (1).| References created (2).| CWES updated (1)."
                },
                {
                    "date": "2026-02-18T06:12:38.125289Z",
                    "number": "4",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-02-20T00:24:52.306911Z",
                    "number": "5",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| References created (2).| CWES updated (1)."
                },
                {
                    "date": "2026-02-20T00:24:54.139800Z",
                    "number": "6",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-02-20T00:38:44.614734Z",
                    "number": "7",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| Products created (1).| References created (2).| CWES updated (1)."
                },
                {
                    "date": "2026-02-20T14:13:34.414604Z",
                    "number": "8",
                    "summary": "Source created.| CVE status created. (valid)| EPSS created."
                },
                {
                    "date": "2026-02-20T14:13:37.107846Z",
                    "number": "9",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-02-20T17:03:53.323819Z",
                    "number": "10",
                    "summary": "Unknown change."
                },
                {
                    "date": "2026-02-20T17:04:00.268126Z",
                    "number": "11",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-02-20T17:39:43.152666Z",
                    "number": "12",
                    "summary": "References created (1)."
                },
                {
                    "date": "2026-02-20T18:12:33.899111Z",
                    "number": "13",
                    "summary": "References created (1)."
                },
                {
                    "date": "2026-02-24T00:13:01.972422Z",
                    "number": "14",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| References created (3)."
                },
                {
                    "date": "2026-02-24T00:13:06.436932Z",
                    "number": "15",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-02-25T22:18:08.121352Z",
                    "number": "16",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| Products connected (24).| Products created (11).| References created (4).| CWES updated (1)."
                },
                {
                    "date": "2026-02-25T22:18:19.319632Z",
                    "number": "17",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-20T09:43:00.999245Z",
                    "number": "18",
                    "summary": "Source connected.| CVE status created. (valid)| EPSS created."
                },
                {
                    "date": "2026-03-20T09:43:03.248201Z",
                    "number": "19",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-20T18:01:55.742882Z",
                    "number": "20",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| References created (2).| CWES updated (1)."
                },
                {
                    "date": "2026-03-20T19:14:25.797737Z",
                    "number": "21",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| Products created (2).| References created (5).| CWES updated (1)."
                },
                {
                    "date": "2026-03-20T19:14:28.199924Z",
                    "number": "22",
                    "summary": "NCSC Score updated."
                }
            ],
            "status": "interim",
            "version": "22"
        }
    },
    "product_tree": {
        "branches": [
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/<1.0.2-0.20260215211005-727213631ce6",
                                "product": {
                                    "name": "vers:unknown/<1.0.2-0.20260215211005-727213631ce6",
                                    "product_id": "CSAFPID-5643332"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "github.com/abhinavxd/libredesk"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/1.0.2-0.20260215211005-727213631ce6",
                                "product": {
                                    "name": "vers:unknown/1.0.2-0.20260215211005-727213631ce6",
                                    "product_id": "CSAFPID-5875596"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/<1.0.2-0.20260215211005-727213631ce6",
                                "product": {
                                    "name": "vers:unknown/<1.0.2-0.20260215211005-727213631ce6",
                                    "product_id": "CSAFPID-5875597"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "go/github.com/abhinavxd/libredesk"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/>=0|<1.0.2-0.20260215211005-727213631ce6",
                                "product": {
                                    "name": "vers:unknown/>=0|<1.0.2-0.20260215211005-727213631ce6",
                                    "product_id": "CSAFPID-5627340"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.1.0-alpha",
                                "product": {
                                    "name": "vers:unknown/v0.1.0-alpha",
                                    "product_id": "CSAFPID-5310358"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.1.1-alpha",
                                "product": {
                                    "name": "vers:unknown/v0.1.1-alpha",
                                    "product_id": "CSAFPID-5310359"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.10.0-beta",
                                "product": {
                                    "name": "vers:unknown/v0.10.0-beta",
                                    "product_id": "CSAFPID-5713084"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.11.0-beta",
                                "product": {
                                    "name": "vers:unknown/v0.11.0-beta",
                                    "product_id": "CSAFPID-5713085"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.11.1-beta",
                                "product": {
                                    "name": "vers:unknown/v0.11.1-beta",
                                    "product_id": "CSAFPID-5713086"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.2.1-alpha",
                                "product": {
                                    "name": "vers:unknown/v0.2.1-alpha",
                                    "product_id": "CSAFPID-5310360"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.3.0-alpha",
                                "product": {
                                    "name": "vers:unknown/v0.3.0-alpha",
                                    "product_id": "CSAFPID-5310361"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.3.1-alpha",
                                "product": {
                                    "name": "vers:unknown/v0.3.1-alpha",
                                    "product_id": "CSAFPID-5310362"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.3.2-alpha",
                                "product": {
                                    "name": "vers:unknown/v0.3.2-alpha",
                                    "product_id": "CSAFPID-5310363"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.3.3-alpha",
                                "product": {
                                    "name": "vers:unknown/v0.3.3-alpha",
                                    "product_id": "CSAFPID-5310364"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.4.0-alpha",
                                "product": {
                                    "name": "vers:unknown/v0.4.0-alpha",
                                    "product_id": "CSAFPID-5310365"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.4.1-alpha",
                                "product": {
                                    "name": "vers:unknown/v0.4.1-alpha",
                                    "product_id": "CSAFPID-5310366"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.4.2-alpha",
                                "product": {
                                    "name": "vers:unknown/v0.4.2-alpha",
                                    "product_id": "CSAFPID-5310367"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.4.3-alpha",
                                "product": {
                                    "name": "vers:unknown/v0.4.3-alpha",
                                    "product_id": "CSAFPID-5310368"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.5.0-alpha",
                                "product": {
                                    "name": "vers:unknown/v0.5.0-alpha",
                                    "product_id": "CSAFPID-5310369"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.6.0-alpha",
                                "product": {
                                    "name": "vers:unknown/v0.6.0-alpha",
                                    "product_id": "CSAFPID-5310370"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.7.0-alpha",
                                "product": {
                                    "name": "vers:unknown/v0.7.0-alpha",
                                    "product_id": "CSAFPID-5310371"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.7.1-alpha",
                                "product": {
                                    "name": "vers:unknown/v0.7.1-alpha",
                                    "product_id": "CSAFPID-5310372"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.7.2-alpha",
                                "product": {
                                    "name": "vers:unknown/v0.7.2-alpha",
                                    "product_id": "CSAFPID-5310373"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.7.3-alpha",
                                "product": {
                                    "name": "vers:unknown/v0.7.3-alpha",
                                    "product_id": "CSAFPID-5310374"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.7.4-alpha",
                                "product": {
                                    "name": "vers:unknown/v0.7.4-alpha",
                                    "product_id": "CSAFPID-5310375"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.8.0-beta",
                                "product": {
                                    "name": "vers:unknown/v0.8.0-beta",
                                    "product_id": "CSAFPID-5310376"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.8.1-beta",
                                "product": {
                                    "name": "vers:unknown/v0.8.1-beta",
                                    "product_id": "CSAFPID-5310377"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.8.2-beta",
                                "product": {
                                    "name": "vers:unknown/v0.8.2-beta",
                                    "product_id": "CSAFPID-5310378"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.8.3-beta",
                                "product": {
                                    "name": "vers:unknown/v0.8.3-beta",
                                    "product_id": "CSAFPID-5310379"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.8.4-beta",
                                "product": {
                                    "name": "vers:unknown/v0.8.4-beta",
                                    "product_id": "CSAFPID-5310380"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.8.5-beta",
                                "product": {
                                    "name": "vers:unknown/v0.8.5-beta",
                                    "product_id": "CSAFPID-5310381"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.8.6-beta",
                                "product": {
                                    "name": "vers:unknown/v0.8.6-beta",
                                    "product_id": "CSAFPID-5713087"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.9.1-beta",
                                "product": {
                                    "name": "vers:unknown/v0.9.1-beta",
                                    "product_id": "CSAFPID-5713088"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.9.2-beta",
                                "product": {
                                    "name": "vers:unknown/v0.9.2-beta",
                                    "product_id": "CSAFPID-5713089"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.9.3-beta",
                                "product": {
                                    "name": "vers:unknown/v0.9.3-beta",
                                    "product_id": "CSAFPID-5713090"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.9.4-beta",
                                "product": {
                                    "name": "vers:unknown/v0.9.4-beta",
                                    "product_id": "CSAFPID-5713091"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v0.9.5-beta",
                                "product": {
                                    "name": "vers:unknown/v0.9.5-beta",
                                    "product_id": "CSAFPID-5713092"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v1.0.0",
                                "product": {
                                    "name": "vers:unknown/v1.0.0",
                                    "product_id": "CSAFPID-5713093"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v1.0.1",
                                "product": {
                                    "name": "vers:unknown/v1.0.1",
                                    "product_id": "CSAFPID-5713094"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "libredesk"
                    }
                ],
                "category": "vendor",
                "name": "abhinavxd"
            }
        ]
    },
    "vulnerabilities": [
        {
            "cve": "CVE-2026-26957",
            "cwe": {
                "id": "CWE-209",
                "name": "Generation of Error Message Containing Sensitive Information"
            },
            "notes": [
                {
                    "category": "description",
                    "text": "**Date:** 2025-12-07\n**Vulnerability:** Server-Side Request Forgery (SSRF)\n**Component:** Webhooks Module\n\n## Executive Summary\nA critical security vulnerability exists in the LibreDesk Webhooks module that allows an authenticated \"Application Admin\" to compromise the underlying cloud infrastructure or internal corporate network where this service is being hosted.\n\nThe application fails to validate destination URLs for webhooks. This allows an attacker to force the server to make HTTP requests to arbitrary internal destinations.\n\n## Confirmed Attack Vectors\n\n### 1. Internal Port Scanning (Network Mapping)\nAttackers can map the internal network by observing the difference between successful connections and connection errors. This works even if the response body is not returned.\n\n**Proof of Exploitation (from Server Logs):**\n*   **Open Port (8890)**: The server connects successfully.\n    ```text\n    timestamp=... level=info message=\"webhook delivered successfully\" ... status_code=200\n    ```\n*   **Closed Port (8891)**: The server fails to connect.\n    ```text\n    timestamp=... level=error message=\"webhook delivery failed\" ... error=\"... connect: connection refused\"\n    ```\n\n**Impact**: An attacker can identify running services (databases, caches, internal apps) on the local network (e.g., `localhost`, `192.168.x.x`).\n\n### 2. Information Leakage (Error-Based)\nIf the internal service returns a non-2xx response (e.g., 403 Forbidden, 404 Not Found, 500 Error), the application **logs the full response body**.\n\n**Proof of Exploitation (from Server Logs):**\n```text\ntimestamp=... level=error message=\"webhook delivery failed\" ... \nresponse=\"{\\\"secret_key\\\": \\\"xxx123\\\", \\\"role\\\": \\\"admin\\\"}\"\n```\n\n**Impact**: An attacker can extract sensitive data by targeting endpoints that return errors or by forcing errors on internal services.\n\n## Technical Root Cause\n1.  **Missing Input Validation**: `cmd/webhooks.go` only checks if the URL is empty, not if it resolves to a private IP.\n2.  **Unrestricted HTTP Client**: `internal/webhook/webhook.go` uses a default `http.Client` that follows redirects and connects to any IP.\n3.  **Verbose Error Logging**: The application logs the full response body on failure, creating a side-channel for data exfiltration.\n\n## Remediation Required\nTo prevent this, the application must implement **Defense in Depth**:\n\n1.  **Input Validation**: Block URLs resolving to private IP ranges (RFC 1918) and Link-Local addresses.\n2.  **Safe HTTP Client**: Use a custom `http.Transport` that verifies the destination IP address *after* DNS resolution to prevent DNS rebinding attacks.",
                    "title": "github - https://github.com/advisories/GHSA-wgm6-9rvv-3438"
                },
                {
                    "category": "description",
                    "text": "**Date:** 2025-12-07\n**Vulnerability:** Server-Side Request Forgery (SSRF)\n**Component:** Webhooks Module\n\n## Executive Summary\nA critical security vulnerability exists in the LibreDesk Webhooks module that allows an authenticated \"Application Admin\" to compromise the underlying cloud infrastructure or internal corporate network where this service is being hosted.\n\nThe application fails to validate destination URLs for webhooks. This allows an attacker to force the server to make HTTP requests to arbitrary internal destinations.\n\n## Confirmed Attack Vectors\n\n### 1. Internal Port Scanning (Network Mapping)\nAttackers can map the internal network by observing the difference between successful connections and connection errors. This works even if the response body is not returned.\n\n**Proof of Exploitation (from Server Logs):**\n*   **Open Port (8890)**: The server connects successfully.\n    ```text\n    timestamp=... level=info message=\"webhook delivered successfully\" ... status_code=200\n    ```\n*   **Closed Port (8891)**: The server fails to connect.\n    ```text\n    timestamp=... level=error message=\"webhook delivery failed\" ... error=\"... connect: connection refused\"\n    ```\n\n**Impact**: An attacker can identify running services (databases, caches, internal apps) on the local network (e.g., `localhost`, `192.168.x.x`).\n\n### 2. Information Leakage (Error-Based)\nIf the internal service returns a non-2xx response (e.g., 403 Forbidden, 404 Not Found, 500 Error), the application **logs the full response body**.\n\n**Proof of Exploitation (from Server Logs):**\n```text\ntimestamp=... level=error message=\"webhook delivery failed\" ... \nresponse=\"{\\\"secret_key\\\": \\\"xxx123\\\", \\\"role\\\": \\\"admin\\\"}\"\n```\n\n**Impact**: An attacker can extract sensitive data by targeting endpoints that return errors or by forcing errors on internal services.\n\n## Technical Root Cause\n1.  **Missing Input Validation**: `cmd/webhooks.go` only checks if the URL is empty, not if it resolves to a private IP.\n2.  **Unrestricted HTTP Client**: `internal/webhook/webhook.go` uses a default `http.Client` that follows redirects and connects to any IP.\n3.  **Verbose Error Logging**: The application logs the full response body on failure, creating a side-channel for data exfiltration.\n\n## Remediation Required\nTo prevent this, the application must implement **Defense in Depth**:\n\n1.  **Input Validation**: Block URLs resolving to private IP ranges (RFC 1918) and Link-Local addresses.\n2.  **Safe HTTP Client**: Use a custom `http.Transport` that verifies the destination IP address *after* DNS resolution to prevent DNS rebinding attacks.",
                    "title": "osv - https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/Go%2FGHSA-wgm6-9rvv-3438.json?alt=media"
                },
                {
                    "category": "description",
                    "text": "Libredesk is a self-hosted customer support desk application. Versions prior to 1.0.2-0.20260215211005-727213631ce6 fail to validate destination URLs for webhooks, allowing an attacker posing as an authenticated \"Application Admin\" to force the server to make HTTP requests to arbitrary internal destinations. This could compromise the underlying cloud infrastructure or internal corporate network where the service is hosted. This issue has been fixed in version 1.0.2-0.20260215211005-727213631ce6.",
                    "title": "nvd - https://nvd.nist.gov/vuln/detail/CVE-2026-26957"
                },
                {
                    "category": "description",
                    "text": "Libredesk is a self-hosted customer support desk application. Versions prior to 1.0.2-0.20260215211005-727213631ce6 fail to validate destination URLs for webhooks, allowing an attacker posing as an authenticated \"Application Admin\" to force the server to make HTTP requests to arbitrary internal destinations. This could compromise the underlying cloud infrastructure or internal corporate network where the service is hosted. This issue has been fixed in version 1.0.2-0.20260215211005-727213631ce6.",
                    "title": "cveprojectv5 - https://www.cve.org/CVERecord?id=CVE-2026-26957"
                },
                {
                    "category": "description",
                    "text": "Libredesk has a SSRF Vulnerability in Webhooks in github.com/abhinavxd/libredesk",
                    "title": "osv - https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/Go%2FGO-2026-4505.json?alt=media"
                },
                {
                    "category": "description",
                    "text": "Libredesk is a self-hosted customer support desk application. Versions prior to 1.0.2-0.20260215211005-727213631ce6 fail to validate destination URLs for webhooks, allowing an attacker posing as an authenticated \"Application Admin\" to force the server to make HTTP requests to arbitrary internal destinations. This could compromise the underlying cloud infrastructure or internal corporate network where the service is hosted. This issue has been fixed in version 1.0.2-0.20260215211005-727213631ce6.",
                    "title": "osv - https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/GIT%2FCVE-2026-26957.json?alt=media"
                },
                {
                    "category": "description",
                    "text": "Libredesk is a self-hosted customer support desk application. Versions prior to 1.0.2-0.20260215211005-727213631ce6 fail to validate destination URLs for webhooks, allowing an attacker posing as an authenticated \"Application Admin\" to force the server to make HTTP requests to arbitrary internal destinations. This could compromise the underlying cloud infrastructure or internal corporate network where the service is hosted. This issue has been fixed in version 1.0.2-0.20260215211005-727213631ce6.",
                    "title": "nvd - https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2026-26957"
                },
                {
                    "category": "description",
                    "text": "A critical security vulnerability exists in the LibreDesk Webhooks module that allows an authenticated \"Application Admin\" to compromise the underlying cloud infrastructure or internal corporate network where this service is being hosted.\n\nThe application fails to validate destination URLs for webhooks. This allows an attacker to force the server to make HTTP requests to arbitrary internal destinations.",
                    "title": "gitlab - https://gitlab.com/api/v4/projects/25847700/repository/files/go%2Fgithub.com%2Fabhinavxd%2Flibredesk%2FCVE-2026-26957.yml/raw"
                },
                {
                    "category": "other",
                    "text": "0.00054",
                    "title": "EPSS"
                },
                {
                    "category": "other",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N",
                    "title": "CVSSV4"
                },
                {
                    "category": "other",
                    "text": "6.9",
                    "title": "CVSSV4 base score"
                },
                {
                    "category": "other",
                    "text": "3.9",
                    "title": "NCSC Score"
                },
                {
                    "category": "other",
                    "text": "There is cwe data available from source Nvd",
                    "title": "NCSC Score top decreasing factors"
                }
            ],
            "product_status": {
                "fixed": [
                    "CSAFPID-5875596"
                ],
                "known_affected": [
                    "CSAFPID-5627340",
                    "CSAFPID-5643332",
                    "CSAFPID-5310358",
                    "CSAFPID-5310359",
                    "CSAFPID-5310360",
                    "CSAFPID-5310361",
                    "CSAFPID-5310362",
                    "CSAFPID-5310363",
                    "CSAFPID-5310364",
                    "CSAFPID-5310365",
                    "CSAFPID-5310366",
                    "CSAFPID-5310367",
                    "CSAFPID-5310368",
                    "CSAFPID-5310369",
                    "CSAFPID-5310370",
                    "CSAFPID-5310371",
                    "CSAFPID-5310372",
                    "CSAFPID-5310373",
                    "CSAFPID-5310374",
                    "CSAFPID-5310375",
                    "CSAFPID-5310376",
                    "CSAFPID-5310377",
                    "CSAFPID-5310378",
                    "CSAFPID-5310379",
                    "CSAFPID-5310380",
                    "CSAFPID-5310381",
                    "CSAFPID-5713084",
                    "CSAFPID-5713085",
                    "CSAFPID-5713086",
                    "CSAFPID-5713087",
                    "CSAFPID-5713088",
                    "CSAFPID-5713089",
                    "CSAFPID-5713090",
                    "CSAFPID-5713091",
                    "CSAFPID-5713092",
                    "CSAFPID-5713093",
                    "CSAFPID-5713094",
                    "CSAFPID-5875597"
                ]
            },
            "references": [
                {
                    "category": "external",
                    "summary": "Source - github",
                    "url": "https://github.com/advisories/GHSA-wgm6-9rvv-3438"
                },
                {
                    "category": "external",
                    "summary": "Source raw - github",
                    "url": "https://api.github.com/advisories/GHSA-wgm6-9rvv-3438"
                },
                {
                    "category": "external",
                    "summary": "Source - osv",
                    "url": "https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/Go%2FGHSA-wgm6-9rvv-3438.json?alt=media"
                },
                {
                    "category": "external",
                    "summary": "Source - nvd",
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26957"
                },
                {
                    "category": "external",
                    "summary": "Source raw - nvd",
                    "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2026-26957"
                },
                {
                    "category": "external",
                    "summary": "Source - cveprojectv5",
                    "url": "https://www.cve.org/CVERecord?id=CVE-2026-26957"
                },
                {
                    "category": "external",
                    "summary": "Source raw - cveprojectv5",
                    "url": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2026/26xxx/CVE-2026-26957.json"
                },
                {
                    "category": "external",
                    "summary": "Source - first",
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-26957"
                },
                {
                    "category": "external",
                    "summary": "Source raw - first",
                    "url": "https://api.first.org/data/v1/epss?limit=10000&offset=0"
                },
                {
                    "category": "external",
                    "summary": "Source - osv",
                    "url": "https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/Go%2FGO-2026-4505.json?alt=media"
                },
                {
                    "category": "external",
                    "summary": "Source - osv",
                    "url": "https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/GIT%2FCVE-2026-26957.json?alt=media"
                },
                {
                    "category": "external",
                    "summary": "Source - first",
                    "url": "https://api.first.org/data/v1/epss?limit=10000&offset=0"
                },
                {
                    "category": "external",
                    "summary": "Source - nvd",
                    "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2026-26957"
                },
                {
                    "category": "external",
                    "summary": "Source - gitlab",
                    "url": "https://gitlab.com/api/v4/projects/25847700/repository/files/go%2Fgithub.com%2Fabhinavxd%2Flibredesk%2FCVE-2026-26957.yml/raw"
                },
                {
                    "category": "external",
                    "summary": "Reference - cveprojectv5; github; gitlab; nvd; osv",
                    "url": "https://github.com/abhinavxd/libredesk/security/advisories/GHSA-wgm6-9rvv-3438"
                },
                {
                    "category": "external",
                    "summary": "Reference - cveprojectv5; github; gitlab; nvd; osv",
                    "url": "https://github.com/abhinavxd/libredesk/commit/727213631ce6a36bcb06f50ce542155e78f51316"
                },
                {
                    "category": "external",
                    "summary": "Reference - github; gitlab",
                    "url": "https://github.com/advisories/GHSA-wgm6-9rvv-3438"
                },
                {
                    "category": "external",
                    "summary": "Reference - github; gitlab; osv",
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26957"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/26xxx/CVE-2026-26957.json"
                },
                {
                    "category": "external",
                    "summary": "Reference - gitlab",
                    "url": "https://github.com/abhinavxd/libredesk"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
                        "baseScore": 6.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-5310358",
                        "CSAFPID-5310359",
                        "CSAFPID-5310360",
                        "CSAFPID-5310361",
                        "CSAFPID-5310362",
                        "CSAFPID-5310363",
                        "CSAFPID-5310364",
                        "CSAFPID-5310365",
                        "CSAFPID-5310366",
                        "CSAFPID-5310367",
                        "CSAFPID-5310368",
                        "CSAFPID-5310369",
                        "CSAFPID-5310370",
                        "CSAFPID-5310371",
                        "CSAFPID-5310372",
                        "CSAFPID-5310373",
                        "CSAFPID-5310374",
                        "CSAFPID-5310375",
                        "CSAFPID-5310376",
                        "CSAFPID-5310377",
                        "CSAFPID-5310378",
                        "CSAFPID-5310379",
                        "CSAFPID-5310380",
                        "CSAFPID-5310381",
                        "CSAFPID-5627340",
                        "CSAFPID-5643332",
                        "CSAFPID-5713084",
                        "CSAFPID-5713085",
                        "CSAFPID-5713086",
                        "CSAFPID-5713087",
                        "CSAFPID-5713088",
                        "CSAFPID-5713089",
                        "CSAFPID-5713090",
                        "CSAFPID-5713091",
                        "CSAFPID-5713092",
                        "CSAFPID-5713093",
                        "CSAFPID-5713094",
                        "CSAFPID-5875597"
                    ]
                }
            ],
            "title": "CVE-2026-26957"
        }
    ]
}