Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
33 changes: 21 additions & 12 deletions input/new.json
Original file line number Diff line number Diff line change
@@ -1,15 +1,24 @@
{
"package_name": "",
"patch_versions": [],
"vulnerable_ranges": [],
"cwe": [],
"tldr": "",
"doest_this_affect_me": "",
"how_to_fix": "",
"vulnerable_to": "",
"package_name": "homeassistant",
"patch_versions": [
"2026.2.3"
],
"vulnerable_ranges": [
[
"0.0.1",
"2026.2.2"
]
],
"cwe": [
"CWE-918"
],
"tldr": "Affected versions of this package are vulnerable to a server-side request forgery (SSRF) bypass due to insufficient validation of HTTP redirects in the internal HTTP client. When Home Assistant performs outbound HTTP requests, a malicious server could return a redirect pointing to localhost or other loopback addresses, causing the client to follow the redirect and access internal services that should not be reachable. An attacker controlling the remote endpoint could exploit this behavior to force requests to internal network resources, potentially exposing sensitive services or data. The issue is addressed by blocking redirects that resolve to loopback or unspecified addresses such as localhost.",
"doest_this_affect_me": "You are affected if you are using a version that falls within the vulnerable range.",
"how_to_fix": "Upgrade the `homeassistant` library to the patch version.",
"vulnerable_to": "Server-Side Request Forgery (SSRF)",
"related_cve_id": "",
"language": "",
"severity_class": "",
"aikido_score": 0,
"changelog": ""
"language": "PYTHON",
"severity_class": "HIGH",
"aikido_score": 72,
"changelog": "https://github.com/home-assistant/core/releases/tag/2026.2.3"
}