Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-42261— PromptHub: Authenticated SSRF via IPv6 filter bypass in `POST /api/skills/fetch-remote`

CVSS 7.1 · High EPSS 0.06% · P17
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-42261

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
PromptHub: Authenticated SSRF via IPv6 filter bypass in `POST /api/skills/fetch-remote`
Source: NVD (National Vulnerability Database)
Vulnerability Description
PromptHub is an all-in-one AI toolbox for prompt, skill, and agent management. From version 0.4.9 to before version 0.5.4, apps/web/src/routes/skills.ts exposes an authenticated endpoint POST /api/skills/fetch-remote that fetches a user-supplied URL server-side and reflects the response body (up to 5 MB) back to the caller. The SSRF protection in apps/web/src/utils/remote-http.ts (isPrivateIPv6) attempts to block private/loopback destinations, but multiple alternate-but-valid IPv6 representations bypass the check. The bypasses reach any IPv4 address (loopback, RFC1918, link-local) via IPv4-mapped IPv6 in hex form, and the canonical ::1 via any representation that isn't the literal string "::1". Any authenticated user (role: user or admin) can trigger the SSRF. On deployments configured with ALLOW_REGISTRATION=true — a supported and documented configuration — this means any internet user who can register. This issue has been patched in version 0.5.4.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
PromptHub 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
PromptHub是凌小添(legeling)个人开发者的一款AI提示词与技能管理工具。 PromptHub 0.4.9版本至0.5.4之前版本存在输入验证错误漏洞,该漏洞源于POST /api/skills/fetch-remote端点获取用户提供的URL并返回响应体,SSRF保护尝试阻止私有/回环目标但多个替代但有效的IPv6表示绕过检查,任何认证用户均可触发SSRF,在配置ALLOW_REGISTRATION=true的部署中任何能注册的互联网用户均可利用。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
legelingPromptHub >= 0.4.9, < 0.5.4 -

II. Public POCs for CVE-2026-42261

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-42261

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-42261

No comments yet


Leave a comment