No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 27 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Page-replica
Page-replica page Replica |
|
| Vendors & Products |
Page-replica
Page-replica page Replica |
Fri, 27 Mar 2026 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in Page-Replica Page Replica up to e4a7f52e75093ee318b4d5a9a9db6751050d2ad0. The impacted element is the function sitemap.fetch of the file /sitemap of the component Endpoint. The manipulation of the argument url leads to server-side request forgery. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | Page-Replica Page Replica Endpoint sitemap sitemap.fetch server-side request forgery | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-27T01:33:14.205Z
Reserved: 2026-03-26T16:01:47.880Z
Link: CVE-2026-4907
No data.
Status : Received
Published: 2026-03-27T02:16:00.330
Modified: 2026-03-27T02:16:00.330
Link: CVE-2026-4907
No data.
OpenCVE Enrichment
Updated: 2026-03-27T09:22:23Z