CVE-2026-22772
📋 TL;DR
CVE-2026-22772 is a server-side request forgery (SSRF) vulnerability in Fulcio's MetaIssuer URL validation. Attackers can bypass validation using unanchored regex to trigger blind SSRF requests to internal services, allowing network probing. This affects Fulcio deployments prior to version 1.8.5.
💻 Affected Systems
- Fulcio
📦 What is this software?
Fulcio by Linuxfoundation
⚠️ Risk & Real-World Impact
Worst Case
Attackers could map internal network topology, discover internal services, and potentially chain with other vulnerabilities for further exploitation.
Likely Case
Internal network reconnaissance through blind SSRF, allowing attackers to identify potential targets for further attacks.
If Mitigated
Limited to network discovery without data exfiltration or state mutation due to GET-only requests and no response return.
🎯 Exploit Status
Exploitation requires crafting malicious MetaIssuer URLs to bypass regex validation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.8.5
Vendor Advisory: https://github.com/sigstore/fulcio/security/advisories/GHSA-59jp-pj84-45mr
Restart Required: Yes
Instructions:
1. Update Fulcio to version 1.8.5 or later. 2. Restart the Fulcio service. 3. Verify the fix by checking the version and testing MetaIssuer URL validation.
🔧 Temporary Workarounds
Network segmentation
linuxRestrict Fulcio's outbound network access to prevent SSRF to internal services.
iptables -A OUTPUT -p tcp -m owner --uid-owner fulcio -j DROP
firewall-cmd --permanent --add-rich-rule='rule family=ipv4 source address=0.0.0.0/0 port port=80 protocol=tcp drop'
🧯 If You Can't Patch
- Implement strict network egress filtering to limit Fulcio's outbound connections
- Deploy web application firewall (WAF) rules to block SSRF patterns in MetaIssuer URLs
🔍 How to Verify
Check if Vulnerable:
Check Fulcio version: if version < 1.8.5, system is vulnerable.
Check Version:
fulcio --version
Verify Fix Applied:
Confirm Fulcio version is 1.8.5 or later and test MetaIssuer URL validation with crafted inputs.
📡 Detection & Monitoring
Log Indicators:
- Unusual outbound HTTP GET requests from Fulcio process
- Failed MetaIssuer validation attempts
Network Indicators:
- Unexpected HTTP traffic from Fulcio to internal IP ranges
SIEM Query:
source="fulcio" AND (http_method="GET" AND dest_ip IN (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16))