Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-25738

CVE-2026-25738: Indico Event Management SSRF Vulnerability

CVE-2026-25738 is a server-side request forgery flaw in Indico event management system that allows users to access localhost or cloud metadata endpoints. This post covers technical details, affected versions, impact, and mitigation.

Published: February 20, 2026

CVE-2026-25738 Overview

CVE-2026-25738 is a Server-Side Request Forgery (SSRF) vulnerability affecting Indico, an event management system that uses Flask-Multipass for multi-backend authentication. The vulnerability exists in versions prior to 3.3.10 and allows attackers to make the server perform unintended outgoing requests to user-controlled URLs.

Indico makes outgoing requests to user-provided URLs as part of its core functionality. However, the application failed to properly restrict access to "special" targets such as localhost, internal network addresses, and cloud metadata endpoints. This SSRF vulnerability can be exploited via DNS rebinding techniques to bypass URL validation and access sensitive internal resources.

Critical Impact

Attackers can leverage this SSRF vulnerability to access internal services, cloud metadata endpoints (particularly dangerous on AWS), and sensitive data that should not be accessible from external networks.

Affected Products

  • Indico versions prior to 3.3.10
  • Deployments hosted on cloud platforms (AWS, GCP, Azure) with accessible metadata endpoints
  • Environments where event organizers are untrusted

Discovery Timeline

  • 2026-02-19 - CVE CVE-2026-25738 published to NVD
  • 2026-02-19 - Last updated in NVD database

Technical Details for CVE-2026-25738

Vulnerability Analysis

This SSRF vulnerability stems from insufficient URL validation when Indico processes user-provided URLs for outgoing requests. The flaw is compounded by a Time-of-Check Time-of-Use (TOCTOU) race condition (CWE-367) in the DNS resolution process, commonly known as DNS rebinding.

In a DNS rebinding attack, an attacker controls a malicious DNS server that initially resolves a hostname to a safe IP address during validation, then rapidly changes the DNS response to point to an internal IP address (such as 127.0.0.1 or 169.254.169.254 for AWS metadata) when the actual request is made. This allows attackers to bypass URL blocklist protections.

The vulnerability is particularly concerning for cloud-hosted instances where metadata endpoints expose sensitive information such as IAM credentials, instance configuration, and other cloud provider secrets. Only event organizers can access the endpoints where SSRF responses are visible, which provides some risk mitigation for environments with trusted organizers.

Root Cause

The root cause is a TOCTOU race condition (CWE-367) in URL validation. The application validates the destination IP address at one point in time but the DNS resolution may return a different IP address when the actual HTTP request is made. This gap between validation and use allows DNS rebinding attacks to succeed.

The fix introduces patch_socket_getaddrinfo() which patches the socket address resolution mechanism to protect against DNS rebinding by ensuring consistent IP address validation throughout the request lifecycle.

Attack Vector

The attack is network-based and requires no authentication for initial access, though viewing the SSRF response data requires event organizer privileges. An attacker could:

  1. Set up a malicious DNS server with a short TTL
  2. Configure the DNS to initially return a safe external IP address
  3. Submit a URL to Indico using the attacker-controlled domain
  4. The DNS quickly rebinds to an internal IP (localhost, cloud metadata, etc.)
  5. Indico makes the request to the internal resource
  6. The attacker (if an event organizer) can view the response containing sensitive data
python
# Security patch in indico/__init__.py - Protect against SSRF via DNS rebinding (#7283)
# Source: https://github.com/indico/indico/commit/70d341826116fac5868719a6133f2c26d9345137

 # LICENSE file for more details.
 
 from indico.util.mimetypes import register_custom_mimetypes
+from indico.util.network import patch_socket_getaddrinfo
 
 
 __version__ = '3.3.10-dev'
 PREFERRED_PYTHON_VERSION_SPEC = '~=3.12.2'
 
 register_custom_mimetypes()
+patch_socket_getaddrinfo()

The patch imports and applies patch_socket_getaddrinfo() at application startup to ensure DNS resolution is protected throughout the application lifecycle.

Detection Methods for CVE-2026-25738

Indicators of Compromise

  • Outbound HTTP/HTTPS requests from Indico to internal IP ranges (10.x.x.x, 172.16-31.x.x, 192.168.x.x, 127.0.0.1)
  • Requests to cloud metadata endpoints (169.254.169.254 on AWS, metadata.google.internal on GCP)
  • Unusual DNS queries with very short TTL values followed by rapid IP changes
  • Event organizer accounts making repeated requests to external URLs that resolve to internal addresses

Detection Strategies

  • Monitor web application firewall (WAF) logs for outbound requests to RFC 1918 private IP ranges
  • Implement network segmentation monitoring to detect traffic from Indico servers to sensitive internal services
  • Review Indico application logs for URL submission patterns that may indicate SSRF probing
  • Deploy DNS monitoring to detect rebinding attempts with short TTL values

Monitoring Recommendations

  • Configure alerting for any Indico server connections to cloud metadata IP addresses (169.254.169.254)
  • Implement egress filtering rules and monitor for bypass attempts
  • Enable verbose logging for Indico's URL processing functions
  • Monitor for unusual event organizer activity patterns that could indicate exploitation attempts

How to Mitigate CVE-2026-25738

Immediate Actions Required

  • Upgrade Indico to version 3.3.10 or later immediately
  • Review recent event organizer activity for suspicious URL submissions
  • Audit any data that may have been accessed via SSRF if exploitation is suspected
  • Implement network-level egress filtering to block requests to internal IP ranges and cloud metadata endpoints

Patch Information

The vulnerability is fixed in Indico version 3.3.10. The patch introduces DNS rebinding protection via the patch_socket_getaddrinfo() function imported from indico.util.network. This ensures that URL validation and request execution use consistent IP address resolution, preventing TOCTOU attacks.

Update to the patched version using your package manager or by downloading from the GitHub Release v3.3.10. The specific fix can be reviewed in the GitHub Commit Details.

Workarounds

  • Configure HTTP proxy environment variables (http_proxy and https_proxy) to route all outbound requests through a filtering proxy
  • Apply these environment variables to both the indico-uwsgi and indico-celery services
  • Implement network-level egress filtering to block requests to localhost, private IP ranges, and cloud metadata endpoints
  • Limit event organizer privileges to trusted users only, as SSRF response data is only visible to organizers
bash
# Configuration example - Set proxy environment variables for Indico services
# Add to indico-uwsgi and indico-celery service configurations

export http_proxy="http://your-filtering-proxy:8080"
export https_proxy="http://your-filtering-proxy:8080"
export no_proxy="localhost,127.0.0.1"

# For systemd services, add to the [Service] section:
# Environment="http_proxy=http://your-filtering-proxy:8080"
# Environment="https_proxy=http://your-filtering-proxy:8080"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeSSRF

  • Vendor/TechIndico

  • SeverityMEDIUM

  • CVSS Score6.9

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-367
  • Technical References
  • GitHub Commit Details

  • GitHub Release v3.3.10

  • GitHub Security Advisory GHSA-f47c-3c5w-v7p4
  • Related CVEs
  • CVE-2026-25739: Indico Event Management XSS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English