CVE-2026-30832: soft-serve vulnerable to SSRF via unvalidated LFS endpoint in repo import
An authenticated SSH user can force the server to make HTTP requests to internal/private IP addresses by running repo import with a crafted --lfs-endpoint URL. The initial batch request is blind (the response from a metadata endpoint won’t parse as valid LFS JSON), but an attacker hosting a fake LFS server can chain this into full read access to internal services by returning download URLs that point at internal targets.
References
- github.com/advisories/GHSA-3fvx-xrxq-8jvv
- github.com/charmbracelet/soft-serve
- github.com/charmbracelet/soft-serve/commit/3ef660098ab37a7950457da8ecc25b516e37ce4e
- github.com/charmbracelet/soft-serve/releases/tag/v0.11.4
- github.com/charmbracelet/soft-serve/security/advisories/GHSA-3fvx-xrxq-8jvv
- nvd.nist.gov/vuln/detail/CVE-2026-30832
Code Behaviors & Features
Detect and mitigate CVE-2026-30832 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →