Back to list

edx-enterprise has SSRF via SAML metadata URL in sync_provider_data endpoint — CVE-2026-42860

GitHub · GitHub · CVE-2026-42860

ID
CVE-2026-42860
Date
Updated
Activity
Source
GitHub
Vendor
GitHub
Threat
high
CVSS
8.5
EPSS
0.00028

Summary

## Summary The `sync_provider_data` endpoint in `SAMLProviderDataViewSet` fetches SAML metadata from a URL stored in `SAMLProviderConfig.metadata_source`. An authenticated user with the Enterprise Admin role can set this field to an arbitrary URL via the `SAMLProviderConfigViewSet` PATCH endpoint, then trigger a server-side HTTP request by calling `sync_provider_data`. The fetch in `fetch_metadata_xml()` passes the…

Product

pip: edx-enterprise

What to do

General, cautious steps (verify details in the official source):

  • Prioritize patching or mitigation immediately (treat as actively risky).
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories