Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-42175— requests-hardened: Server-Side Request Forgery (SSRF) in requests-hardened RFC 6598

CVSS 6.5 · Medium EPSS 0.03% · P9

Possible ATT&CK Techniques 1AI

T1190 · Exploit Public-Facing Application

Affected Version Matrix 1

VendorProductVersion RangeStatus
saleorrequests-hardened< 1.2.1affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-42175

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
requests-hardened: Server-Side Request Forgery (SSRF) in requests-hardened RFC 6598
Source: NVD (National Vulnerability Database)
Vulnerability Description
requests-hardened is a library that overrides the default behaviors of the requests library, and adds new security features. Prior to , the SSRF protection in requests-hardened fails to block IP addresses within the RFC 6598 Shared Address Space (100.64.0.0/10). An attacker who can supply arbitrary URLs to requests-hardened could exploit this gap to access internal services hosted within 100.64.0.0/10. This is for example relevant in environments such as AWS EKS where 100.64.0.0/10 is commonly used as the default pod CIDR. The impact is environment-dependent, deployments that utilize the affected CIDR range for internal networking are exposed to SSRF bypass, while others may not be affected. This vulnerability is fixed in .
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
服务端请求伪造(SSRF)
Source: NVD (National Vulnerability Database)
Vulnerability Title
requests-hardened 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
requests-hardened是Saleor Commerce开源的一个增强HTTP请求安全性的Python库。 requests-hardened存在代码问题漏洞,该漏洞源于SSRF保护未能阻止RFC 6598共享地址空间,可能导致攻击者访问内部服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
saleorrequests-hardened < 1.2.1 -

II. Public POCs for CVE-2026-42175

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-42175

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-42175

No comments yet


Leave a comment