Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-30832 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Soft Serve allows authenticated users to force the server to make HTTP requests to internal IPs via a crafted `--lfs-endpoint` URL.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-918** (Server-Side Request Forgery). The flaw lies in how the application handles user-supplied LFS endpoint URLs without proper validation or restriction.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: **Charmbracelet Soft Serve**. Versions **0.6.0 through 0.11.3**. βœ… **Safe**: Version **0.11.4** and later are patched.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: With **Authentication**, hackers can bypass network boundaries. They can access **Internal Services** and potentially read sensitive internal data or network configurations.

Q5Is exploitation threshold high? (Auth/Config)

πŸ” **Threshold**: **Medium**. Requires **Authenticated SSH Access**. It is not an unauthenticated remote exploit, limiting the attack surface to compromised or valid user accounts.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Exploit Status**: No public PoC/Wild Exploit listed in data. However, the vulnerability is well-documented via GitHub Advisory (**GHSA-3fvx-xrxq-8jvv**).

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for **Soft Serve** instances running versions **< 0.11.4**. Check if SSH authentication is enabled and if LFS endpoints are configurable by users.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes. Official patch released in **v0.11.4**. See commit `3ef6600` for details. Update immediately to the latest version.

Q9What if no patch? (Workaround)

πŸ›‘ **No Patch Workaround**: Restrict SSH access strictly. Disable LFS endpoint customization for users if possible. Implement network segmentation to protect internal services from the Soft Serve host.

Q10Is it urgent? (Priority Suggestion)

⚑ **Urgency**: **High Priority** for affected versions. Although auth is required, SSRF risks are severe. Patch to **v0.11.4+** immediately to prevent internal network reconnaissance.