{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-4989","assignerOrgId":"bfee16bd-18e6-446c-9a65-f5b2e3d89c23","state":"PUBLISHED","assignerShortName":"DEVOLUTIONS","dateReserved":"2026-03-27T13:42:14.773Z","datePublished":"2026-04-01T15:07:29.219Z","dateUpdated":"2026-04-01T17:15:10.559Z"},"containers":{"cna":{"providerMetadata":{"orgId":"bfee16bd-18e6-446c-9a65-f5b2e3d89c23","shortName":"DEVOLUTIONS","dateUpdated":"2026-04-01T15:07:29.219Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-918","description":"CWE-918 Server-Side request forgery (SSRF)","type":"CWE"}]}],"affected":[{"vendor":"Devolutions","product":"Server","versions":[{"status":"affected","version":"2026.1.1","lessThanOrEqual":"2026.1.11","versionType":"custom"},{"status":"affected","version":"2025.3.1","lessThanOrEqual":"2025.3.17","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Improper input validation in the gateway health check feature in Devolutions Server allows a low-privileged authenticated user to perform server-side request forgery (SSRF), potentially leading to information disclosure, via a crafted API request.\nThis issue affects Server: from 2026.1.1 through 2026.1.11, from 2025.3.1 through 2025.3.17.","supportingMedia":[{"type":"text/html","base64":false,"value":"Improper input validation in the gateway health check feature in Devolutions Server allows a low-privileged authenticated user to perform server-side request forgery (SSRF), potentially leading to information disclosure, via a crafted API request.<br><p>This issue affects Server: from 2026.1.1 through 2026.1.11, from 2025.3.1 through 2025.3.17.</p>"}]}],"references":[{"url":"https://devolutions.net/security/advisories/DEVO-2026-0010"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 1.0.1"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":4.3,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"LOW","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"timestamp":"2026-04-01T17:13:49.659152Z","id":"CVE-2026-4989","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-01T17:15:10.559Z"}}]}}