icon

We found results for “

CVE-2026-21885

Good to know:

icon
icon

Date: January 8, 2026

Miniflux 2 is an open source feed reader. Prior to version 2.2.16, Miniflux's media proxy endpoint ("GET /proxy/{encodedDigest}/{encodedURL}") can be abused to perform Server-Side Request Forgery (SSRF). An authenticated user can cause Miniflux to generate a signed proxy URL for attacker-chosen media URLs embedded in feed entry content, including internal addresses (e.g., localhost, private RFC1918 ranges, or link-local metadata endpoints). Requesting the resulting "/proxy/..." URL makes Miniflux fetch and return the internal response. Version 2.2.16 fixes the issue.

Severity Score

Severity Score

Weakness Type (CWE)

Server-Side Request Forgery (SSRF)

CWE-918

Top Fix

icon

Upgrade Version

Upgrade to version miniflux.app/v2 - v2.2.16

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): LOW
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): NONE
Availability (A): NONE

Do you need more information?

Contact Us