CVE-2026-30832

Soft Serve · Soft Serve Git Server

An authenticated SSRF vulnerability in Soft Serve allows SSH users to force the server to make requests to internal IP addresses, potentially exposing private services.

Executive summary

Authenticated users of Soft Serve can exploit a Server-Side Request Forgery (SSRF) flaw to gain unauthorized access to internal network services and sensitive metadata.

Vulnerability

An authenticated SSH user can trigger the repo import command with a crafted --lfs-endpoint URL. This allows the attacker to force the server to perform blind HTTP requests to internal/private IP addresses, which can be further exploited to read internal service data.

Business impact

While the attack requires authentication, it allows users to bypass network segmentation and interact with internal APIs, cloud metadata services, or other private resources. This could lead to sensitive data exposure or further exploitation of internal systems. The CVSS score of 9.1 indicates a critical risk to internal infrastructure.

Remediation

Immediate Action: Update Soft Serve to version 0.11.4 or later to implement proper validation of LFS endpoints.

Proactive Monitoring: Inspect server logs for repo import commands targeting internal IP ranges (e.g., 10.x.x.x, 192.168.x.x, 169.254.169.254).

Compensating Controls: Use network-level firewalls or egress filtering to prevent the Git server from initiating connections to sensitive internal subnets.

Exploitation status

Public Exploit Available: true

Analyst recommendation

Administrators should prioritize updating Soft Serve to version 0.11.4. Even though authentication is required, the ability for a user to probe and exploit the internal network represents a significant security failure that must be addressed promptly.