TROYANOSYVIRUS
Back to CVEs

CVE-2026-30247

MEDIUM
5.9

Description

WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.2.12, the application's "Import document via URL" feature is vulnerable to Server-Side Request Forgery (SSRF) through HTTP redirects. While the backend implements comprehensive URL validation (blocking private IPs, loopback addresses, reserved hostnames, and cloud metadata endpoints), it fails to validate redirect targets. An attacker can bypass all protections by using a redirect chain, forcing the server to access internal services. Additionally, Docker-specific internal addresses like host.docker.internal are not blocked. This issue has been patched in version 0.2.12.

CVE Details

CVSS v3.1 Score5.9
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredNONE
User InteractionNONE
Published3/7/2026
Last Modified3/11/2026
Sourcenvd
Honeypot Sightings0

Affected Products

tencent:weknora

Weaknesses (CWE)

CWE-918

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.