CVE-2026-40089: Sonicverse SSRF
CVE-2026-40089
Sonicverse is a Self-hosted Docker Compose stack for live radio streaming. The Sonicverse Radio Audio Streaming Stack dashboard contains a Server-Side Request Forgery (SSRF) vulnerability in its API c...
Overview
CVE-2026-40089 is a critical Server-Side Request Forgery (SSRF) vulnerability in the Sonicverse Radio Audio Streaming Stack. The flaw resides in the dashboard’s API client (apps/dashboard/lib/api.ts), where user-supplied URLs are passed to a server-side HTTP client without proper validation. This allows an authenticated operator to force the backend server to make arbitrary HTTP requests.
Affected Systems
This vulnerability affects deployments of Sonicverse created using the official install.sh script, including the common one-liner installation command: bash <(curl -fsSL https://sonicverse.short.gy/install-audiostack). Any instance installed via this method before the fix is vulnerable.
Impact and Exploitation
With a CVSS score of 9.9, this SSRF vulnerability is severe. An attacker with operator-level access to the dashboard can abuse it to:
- Probe and interact with internal network services that are not normally accessible from the internet.
- Target external systems, potentially using the Sonicverse server’s IP address to bypass IP-based allow lists.
- Access metadata services on cloud platforms (like AWS IMDS), which could lead to cloud account compromise.
While not currently listed on CISA’s Known Exploited Vulnerabilities (KEV) catalog, the low attack complexity and high impact make this a prime target for exploitation.
Remediation and Mitigation
The vulnerability is fixed in commit cb1ddbacafcb441549fe87d3eeabdb6a085325e4. Administrators must immediately update their Sonicverse installation to a version containing this commit.
Action Steps:
- Patch: Update your Sonicverse stack to the latest version immediately. Consult the project’s repository for the correct update procedure.
- Audit: Review operator-level user accounts and audit logs for any suspicious activity, especially unexpected outbound HTTP requests from your Sonicverse host.
- Isolate: As a best practice, ensure your Sonicverse deployment runs in a segmented network zone with restricted egress traffic to minimize the blast radius of any potential SSRF attack.
For more on securing self-hosted services, see related coverage on LangChain, LangGraph Flaws Expose Files, Secrets, and Apple Fixes WebKit Vulnerability Enabling Same-Origin.
Security Insight
This vulnerability highlights the persistent risk of SSRF in modern, containerized self-hosted stacks, where convenient one-click install scripts can rapidly propagate insecure configurations. It mirrors a common pattern seen in other supply-chain issues, where deployment convenience is prioritized over secure defaults. The high severity underscores that even “internal” management dashboards require the same rigorous input validation as public-facing endpoints, a principle often overlooked in rapid-development DevOps tooling, as seen in incidents like the DarkSword iOS Exploit Kit.
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
Server-side request forgery (ssrf) in Azure Databricks allows an unauthorized attacker to elevate privileges over a network....
Server-side request forgery (ssrf) in Azure Cloud Shell allows an unauthorized attacker to elevate privileges over a network....
FastGPT is an AI Agent building platform. Prior to version 4.14.9.5, FastGPT's MCP (Model Context Protocol) tools endpoints (/api/core/app/mcpTools/getTools and /api/core/app/mcpTools/runTool) accept ...
OpenClaw before 2026.3.28 contains a server-side request forgery vulnerability in the fal provider image-generation-provider.ts component that allows attackers to fetch internal URLs. A malicious or c...