{"id":"CVE-2026-30832","summary":"Soft Serve: SSRF via unvalidated LFS endpoint in repo import","details":"Soft Serve is a self-hostable Git server for the command line. From version 0.6.0 to before version 0.11.4, an authenticated SSH user can force the server to make HTTP requests to internal/private IP addresses by running repo import with a crafted --lfs-endpoint URL. The initial batch request is blind (the response from a metadata endpoint won't parse as valid LFS JSON), but an attacker hosting a fake LFS server can chain this into full read access to internal services by returning download URLs that point at internal targets. This issue has been patched in version 0.11.4.","aliases":["GHSA-3fvx-xrxq-8jvv","GO-2026-4634"],"modified":"2026-04-02T13:23:17.379916Z","published":"2026-03-07T15:57:39.158Z","related":["SUSE-SU-2026:1042-1"],"database_specific":{"cwe_ids":["CWE-918"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/30xxx/CVE-2026-30832.json","cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://github.com/charmbracelet/soft-serve/releases/tag/v0.11.4"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/30xxx/CVE-2026-30832.json"},{"type":"ADVISORY","url":"https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-3fvx-xrxq-8jvv"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-30832"},{"type":"FIX","url":"https://github.com/charmbracelet/soft-serve/commit/3ef660098ab37a7950457da8ecc25b516e37ce4e"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/charmbracelet/soft-serve","events":[{"introduced":"fd167be7d2b233cc17555b7df2927bb16b928d97"},{"fixed":"3ef660098ab37a7950457da8ecc25b516e37ce4e"}]}],"versions":["v0.10.0","v0.11.0","v0.11.1","v0.11.2","v0.11.3","v0.6.0","v0.6.1","v0.6.2","v0.7.1","v0.7.2","v0.7.3","v0.7.4","v0.7.5","v0.7.6","v0.8.0","v0.8.1","v0.8.2","v0.8.3","v0.8.4","v0.8.5","v0.9.0","v0.9.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-30832.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L"}]}