Cyber Posture

CVE-2026-35037

HighPublic PoC

Published: 06 April 2026

Published
06 April 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
EPSS Score 0.0005 15.9th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-35037 is a high-severity SSRF (CWE-918) vulnerability in Ech0 Ech0. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 15.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-4 (Information Flow Enforcement) and SC-7 (Boundary Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 3 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of the arbitrary website_url query parameter to block SSRF requests targeting internal hosts, localhost, or cloud metadata endpoints.

prevent

Enforces flow control policies restricting server-side HTTP requests from the vulnerable endpoint to only authorized external destinations, preventing access to unintended internal resources.

preventdetect

Deploys boundary protections like web application firewalls to monitor, filter, and block unauthorized outbound requests initiated by the unauthenticated SSRF endpoint.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1018 Remote System Discovery Discovery
Adversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system.
T1046 Network Service Discovery Discovery
Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation.
T1522 Cloud Instance Metadata API Credential Access
Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data.
Why these techniques?

SSRF in public-facing app directly enables T1190 for initial access; facilitates internal reconnaissance via T1018 (remote systems), T1046 (network services), and T1522 (cloud metadata API) through unauthenticated arbitrary HTTP requests with partial response exfiltration.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Ech0 is an open-source, self-hosted publishing platform for personal idea sharing. Prior to 4.2.8, the GET /api/website/title endpoint accepts an arbitrary URL via the website_url query parameter and makes a server-side HTTP request to it without any validation of the…

more

target host or IP address. The endpoint requires no authentication. An attacker can use this to reach internal network services, cloud metadata endpoints (169.254.169.254), and localhost-bound services, with partial response data exfiltrated via the HTML <title> tag extraction This vulnerability is fixed in 4.2.8.

Deeper analysisAI

CVE-2026-35037 is a server-side request forgery (SSRF) vulnerability (CWE-918) affecting Ech0, an open-source, self-hosted publishing platform for personal idea sharing. In versions prior to 4.2.8, the unauthenticated GET /api/website/title endpoint accepts an arbitrary URL via the website_url query parameter and performs a server-side HTTP request to it without validating the target host or IP address. This allows attackers to probe and interact with unintended resources, with partial response data exfiltrated through HTML <title> tag extraction. The vulnerability has a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N).

Any unauthenticated remote attacker can exploit this vulnerability by sending a crafted request to the endpoint, tricking the Ech0 server into making HTTP requests to internal network services, cloud metadata endpoints such as 169.254.169.254, or localhost-bound services. Successful exploitation enables limited confidentiality and integrity impacts, including reconnaissance of internal infrastructure and potential data leakage via the extracted title content, though no availability impact is possible due to the changed scope.

The vulnerability is fixed in Ech0 version 4.2.8, as detailed in the GitHub security advisory at https://github.com/lin-snow/Ech0/security/advisories/GHSA-cqgf-f4x7-g6wc. Security practitioners should upgrade to 4.2.8 or later and review access to exposed Ech0 instances for SSRF mitigations like URL whitelisting or request filtering.

Details

CWE(s)

Affected Products

ech0
ech0
≤ 4.2.8

CVEs Like This One

CVE-2026-35036Same product: Ech0 Ech0
CVE-2026-41461Shared CWE-918
CVE-2026-33024Shared CWE-918
CVE-2026-35187Shared CWE-918
CVE-2026-5936Shared CWE-918
CVE-2026-34954Shared CWE-918
CVE-2026-27696Shared CWE-918
CVE-2026-4200Shared CWE-918
CVE-2026-33321Shared CWE-918
CVE-2026-40114Shared CWE-918

References