Homarr is an open-source dashboard. Prior to 1.52.0, a public (unauthenticated) tRPC endpoint widget.app.ping accepts an arbitrary url and performs a server-side request to that URL. This allows an unauthenticated attacker to trigger outbound HTTP requests from the Homarr server, enabling SSRF behavior and a reliable port-scanning primitive (open vs closed ports can be inferred from statusCode vs fetch failed and timing). This vulnerability is fixed in 1.52.0.
History

Wed, 18 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Homarr
Homarr homarr
CPEs cpe:2.3:a:homarr:homarr:*:*:*:*:*:*:*:*
Vendors & Products Homarr
Homarr homarr

Mon, 09 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Homarr-labs
Homarr-labs homarr
Vendors & Products Homarr-labs
Homarr-labs homarr

Fri, 06 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
Description Homarr is an open-source dashboard. Prior to 1.52.0, a public (unauthenticated) tRPC endpoint widget.app.ping accepts an arbitrary url and performs a server-side request to that URL. This allows an unauthenticated attacker to trigger outbound HTTP requests from the Homarr server, enabling SSRF behavior and a reliable port-scanning primitive (open vs closed ports can be inferred from statusCode vs fetch failed and timing). This vulnerability is fixed in 1.52.0.
Title Homarr affected by Unauthenticated SSRF / Port-Scan Primitive via widget.app.ping
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2026-02-06T21:19:40.212Z

Updated: 2026-02-09T15:27:03.275Z

Reserved: 2026-01-29T14:03:42.539Z

Link: CVE-2026-25123

cve-icon Vulnrichment

Updated: 2026-02-09T15:21:56.929Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-06T22:16:11.153

Modified: 2026-02-18T18:08:19.073

Link: CVE-2026-25123

cve-icon Redhat

No data.