Project Subscriptions
No data.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-64cv-vxpr-j6vc | edx-enterprise has SSRF via SAML metadata URL in sync_provider_data endpoint |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 11 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 11 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Open edx Enterprise Service app provides enterprise features to the Open edX platform. From 7.0.2 to 7.0.4, the sync_provider_data endpoint in SAMLProviderDataViewSet fetches SAML metadata from a URL stored in SAMLProviderConfig.metadata_source. An authenticated user with the Enterprise Admin role can set this field to an arbitrary URL via the SAMLProviderConfigViewSet PATCH endpoint, then trigger a server-side HTTP request by calling sync_provider_data. The fetch in fetch_metadata_xml() passes the URL directly to requests.get() with no scheme enforcement, IP filtering, or timeout. This vulnerability is fixed in 7.0.5. | |
| Title | Open edx Enterprise Service: SSRF via SAML metadata URL in sync_provider_data endpoint | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-11T20:10:00.779Z
Reserved: 2026-04-30T16:44:48.379Z
Link: CVE-2026-42860
Updated: 2026-05-11T20:08:06.273Z
Status : Received
Published: 2026-05-11T18:16:36.547
Modified: 2026-05-11T21:19:00.510
Link: CVE-2026-42860
No data.
OpenCVE Enrichment
Updated: 2026-05-11T19:30:06Z
Github GHSA