CVE-2026-2711

5.6 MEDIUM

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in the worldquant-miner software up to version 1.0.9. Attackers can exploit this to make the vulnerable server send unauthorized requests to internal or external systems. Organizations using affected versions of worldquant-miner are at risk.

💻 Affected Systems

Products:
  • worldquant-miner
Versions: Up to and including 1.0.9
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the URL handler component via the make_request argument manipulation in ssrf_proxy.py

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, exfiltrate sensitive data, or pivot to attack other internal systems from the compromised server.

🟠

Likely Case

Information disclosure from internal services, potential data exfiltration, or abuse of the server as a proxy for malicious requests.

🟢

If Mitigated

Limited impact with proper network segmentation and egress filtering, potentially only error messages or minimal information disclosure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: HIGH

Exploit has been publicly disclosed and may be used, though complexity is rated high

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Monitor the GitHub repository for updates or consider alternative software.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access from the vulnerable server to only necessary internal services

Egress Filtering

all

Implement firewall rules to block outbound requests from the vulnerable server to unauthorized destinations

🧯 If You Can't Patch

  • Isolate the vulnerable system in a restricted network segment
  • Implement strict egress filtering to limit what destinations the server can reach

🔍 How to Verify

Check if Vulnerable:

Check if worldquant-miner version is 1.0.9 or earlier by examining the software version or checking the ssrf_proxy.py file for vulnerable code patterns

Check Version:

Check the software documentation or configuration files for version information

Verify Fix Applied:

Verify that worldquant-miner has been updated to a version beyond 1.0.9 or that the vulnerable code has been removed/patched

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from the server
  • Requests to internal IP addresses or unusual domains
  • Error messages related to failed SSRF attempts

Network Indicators:

  • Unexpected outbound HTTP traffic from the vulnerable server
  • Requests to internal services that shouldn't be accessed externally

SIEM Query:

source_ip=[vulnerable_server] AND (dest_port=80 OR dest_port=443) AND NOT dest_ip IN [allowed_destinations]

🔗 References

📤 Share & Export