Server-Side Request Forgery Vulnerability in Calcom Logo API
CVE-2026-9304
Key Information:
Badges
What is CVE-2026-9304?
A security flaw has been identified in Calcom's cal.diy product, specifically in the Logo API's function validateUrlForSSRF within the file apps/web/app/api/logo/route.ts. This vulnerability enables remote attackers to conduct server-side request forgery, potentially leading to unauthorized access to internal services. The complexity of the attack means that while exploitation is difficult, the details of the exploit have been released publicly, increasing the risk and capability for malicious actions. Efforts to inform the vendor prior to the public disclosure have gone unanswered.
Affected Version(s)
cal.diy 4.9.0
cal.diy 4.9.1
cal.diy 4.9.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
