CVE-2026-42261: PromptHub SSRF Bypass Via IPv6 Mapped Addresses
The National Vulnerability Database has detailed CVE-2026-42261, a high-severity Server-Side Request Forgery (SSRF) vulnerability in PromptHub, an AI toolbox for prompt, skill, and agent management. Affecting versions 0.4.9 to before 0.5.4, the flaw resides in the /api/skills/fetch-remote endpoint, which, when authenticated, fetches a user-supplied URL and reflects up to 5 MB of the response body. While PromptHub included an IPv6-based check to block private/loopback destinations, multiple alternate IPv6 representations effectively bypass this protection.
Attackers can leverage this bypass to reach any IPv4 address — including loopback, RFC1918, and link-local ranges — by using IPv4-mapped IPv6 in hex form. Furthermore, the canonical ::1 can be reached via any representation other than the literal string “::1”. Any authenticated user, regardless of whether they have a ‘user’ or ‘admin’ role, can trigger this SSRF. Critically, for deployments configured with ALLOW_REGISTRATION=true, any internet user can register and exploit this vulnerability. The issue has been patched in version 0.5.4.
This vulnerability carries a CVSS score of 7.1 (HIGH), with a vector of CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N. This indicates network access, low attack complexity, low privileges required, and no user interaction, leading to high confidentiality impact and low integrity impact. The core issues stem from CWE-20 (Improper Input Validation), CWE-693 (Protection Mechanism Failure), and CWE-918 (Server-Side Request Forgery).
What This Means For You
- If your organization uses PromptHub, immediately verify your deployment version. Patch to 0.5.4 or higher to remediate CVE-2026-42261. If `ALLOW_REGISTRATION=true` is enabled, this SSRF is exposed to any internet user who can register an account, making it a critical exposure. Audit for any anomalous outbound connections or unexpected data retrieval from internal systems if you were running affected versions.
Related ATT&CK Techniques
🛡️ Detection Rules
6 rules · 6 SIEM formats6 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
C2 Beacon Detection — HTTP to Suspicious Domain
title: C2 Beacon Detection — HTTP to Suspicious Domain
id: scw-2026-05-08-1
status: experimental
level: medium
description: |
Detects high-frequency HTTP POST beaconing to target.local, which may indicate compromised endpoints calling back after the CVE-2026-42261 breach.
author: SCW Feed Engine (auto-generated)
date: 2026-05-08
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-42261/
tags:
- attack.command_and_control
- attack.t1071.001
logsource:
category: proxy
detection:
selection:
dst_domain|endswith:
- 'target.local'
cs-method: 'POST'
condition: selection | count() by src_ip > 50
falsepositives:
- Legitimate activity from CVE-2026-42261
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-42261 | SSRF | PromptHub versions 0.4.9 to before 0.5.4 |
| CVE-2026-42261 | SSRF | Vulnerable endpoint: POST /api/skills/fetch-remote in apps/web/src/routes/skills.ts |
| CVE-2026-42261 | SSRF | Bypass of isPrivateIPv6 check in apps/web/src/utils/remote-http.ts using alternate IPv6 representations |
| CVE-2026-42261 | Auth Bypass | Any authenticated user (role: user or admin) can trigger SSRF; if ALLOW_REGISTRATION=true, any internet user can register and trigger. |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 08, 2026 at 07:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.