CVE-2026-30832

Critical
|9.1
Exploit Available

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an authenticated user to trick the Git server into making unauthorized HTTP requests to internal services by using a specially crafted URL. An attacker needs access to the server and can exploit this to gain read access to sensitive internal data by manipulating the server's response.

Technical Description

Soft Serve is a self-hostable Git server for the command line. From version 0.6.0 to before version 0.11.4, an authenticated SSH user can force the server to make HTTP requests to internal/private IP addresses by running repo import with a crafted --lfs-endpoint URL. The initial batch request is blind (the response from a metadata endpoint won't parse as valid LFS JSON), but an attacker hosting a fake LFS server can chain this into full read access to internal services by returning download URLs that point at internal targets. This issue has been patched in version 0.11.4.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactLow
Availability ImpactLow
ScopeChanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$6,000($5K-$15K)
Vendor Response
Grade APatched in 4 days

Quick Information

Published

Mar 7, 2026

about 1 month ago

Last Modified

Mar 11, 2026

27 days ago

Vendor

charm

Product

soft serve