CVE-2026-21885

6.5 MEDIUM

📋 TL;DR

Miniflux 2's media proxy endpoint can be abused by authenticated users to perform Server-Side Request Forgery (SSRF), allowing attackers to make the server fetch internal network resources. This affects all Miniflux 2 installations prior to version 2.2.16 where users can create or modify feed content. Attackers need authenticated access to exploit this vulnerability.

💻 Affected Systems

Products:
  • Miniflux 2
Versions: All versions prior to 2.2.16
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; affects all deployments where users can add or modify feed content.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive internal services, cloud metadata endpoints, or pivot to other internal systems, potentially leading to data exfiltration or further network compromise.

🟠

Likely Case

Attackers with authenticated access could probe internal networks, access internal web services, or retrieve cloud metadata containing credentials.

🟢

If Mitigated

With proper network segmentation and authentication controls, impact is limited to accessing only authorized internal resources reachable from the Miniflux server.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated; SSRF techniques are well-documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2.16

Vendor Advisory: https://github.com/miniflux/v2/security/advisories/GHSA-xwh2-742g-w3wp

Restart Required: Yes

Instructions:

1. Backup your Miniflux database and configuration. 2. Stop the Miniflux service. 3. Update to version 2.2.16 using your package manager or by downloading from GitHub. 4. Restart the Miniflux service. 5. Verify the version is 2.2.16 or higher.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict Miniflux server's outbound network access to prevent SSRF to internal resources.

iptables -A OUTPUT -p tcp --dport 80 -j DROP
iptables -A OUTPUT -p tcp --dport 443 -j DROP

Authentication Hardening

all

Implement strict access controls and monitor for suspicious authenticated user activity.

🧯 If You Can't Patch

  • Implement strict network egress filtering to block Miniflux server access to internal RFC1918 addresses and metadata endpoints.
  • Monitor proxy endpoint logs for unusual patterns and restrict user permissions for feed management.

🔍 How to Verify

Check if Vulnerable:

Check Miniflux version; if below 2.2.16, the system is vulnerable if authenticated users exist.

Check Version:

miniflux --version or check web interface footer

Verify Fix Applied:

Confirm Miniflux version is 2.2.16 or higher and test that proxy endpoint no longer accepts internal URLs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to /proxy/ endpoint with encoded internal IPs
  • Multiple failed proxy requests from single user

Network Indicators:

  • Miniflux server making outbound requests to internal IP ranges
  • Requests to cloud metadata endpoints from Miniflux

SIEM Query:

source="miniflux" AND uri_path="/proxy/*" AND (dst_ip=10.0.0.0/8 OR dst_ip=172.16.0.0/12 OR dst_ip=192.168.0.0/16 OR dst_ip=169.254.169.254)

🔗 References

📤 Share & Export