CVE-2026-5936
Published: 13 April 2026
Summary
CVE-2026-5936 is a high-severity SSRF (CWE-918) vulnerability in Foxit (inferred from references). Its CVSS base score is 8.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Cloud Instance Metadata API (T1522); ranked at the 9.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-4 (Information Flow Enforcement) and SC-7 (Boundary Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Validates crafted URL inputs to prevent attackers from controlling server-side HTTP requests to arbitrary internal destinations.
Enforces boundary protections that block server-initiated connections to internal network services, cloud metadata endpoints, and unauthorized destinations.
Restricts information flows from the vulnerable server to only approved external destinations, mitigating SSRF exploitation for internal probing.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SSRF allows server to query internal services and cloud metadata endpoints, directly enabling remote system/service discovery and cloud instance metadata access for information disclosure.
NVD Description
An attacker can control a server-side HTTP request by supplying a crafted URL, causing the server to initiate requests to arbitrary destinations. This behavior may be exploited to probe internal network services, access otherwise unreachable endpoints (e.g., cloud metadata services),…
more
or bypass network access controls, potentially leading to sensitive information disclosure and further compromise of the internal environment.
Deeper analysisAI
CVE-2026-5936, published on 2026-04-13, is a server-side request forgery (SSRF) vulnerability classified under CWE-918, with a CVSS v3.1 base score of 8.5 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N). It affects Foxit software components, as referenced in the vendor's security bulletins. The vulnerability arises when an attacker supplies a crafted URL that allows control over server-side HTTP requests, causing the server to initiate connections to arbitrary destinations.
A low-privileged remote user can exploit this issue with low attack complexity and no user interaction required. By manipulating the request, the attacker can probe internal network services, reach otherwise inaccessible endpoints such as cloud metadata services, or bypass network access controls. This may result in sensitive information disclosure and enable further compromise of the internal environment.
Mitigation details, including available patches and advisories, are provided in Foxit's security bulletins at https://www.foxit.com/support/security-bulletins.html.
Details
- CWE(s)