No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 13 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sonicverse-eu
Sonicverse-eu audiostreaming-stack |
|
| Vendors & Products |
Sonicverse-eu
Sonicverse-eu audiostreaming-stack |
Thu, 09 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Sonicverse is a Self-hosted Docker Compose stack for live radio streaming. The Sonicverse Radio Audio Streaming Stack dashboard contains a Server-Side Request Forgery (SSRF) vulnerability in its API client (apps/dashboard/lib/api.ts). Installations created using the provided install.sh script (including the one‑liner bash <(curl -fsSL https://sonicverse.short.gy/install-audiostack)) are affected. In these deployments, the dashboard accepts user-controlled URLs and passes them directly to a server-side HTTP client without sufficient validation. An authenticated operator can abuse this to make arbitrary HTTP requests from the dashboard backend to internal or external systems. This vulnerability is fixed with commit cb1ddbacafcb441549fe87d3eeabdb6a085325e4. | |
| Title | Sonicverse has Server-Side Request Forgery via user-controlled URLs in dashboard API client | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-13T20:20:37.737Z
Reserved: 2026-04-09T00:39:12.206Z
Link: CVE-2026-40089
Updated: 2026-04-13T20:20:33.688Z
Status : Awaiting Analysis
Published: 2026-04-09T20:16:27.743
Modified: 2026-04-13T15:02:27.760
Link: CVE-2026-40089
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:29:28Z