[Japanese]

JVNDB-2026-000015

Sonatype Nexus Repository vulnerable to server-side request forgery

Overview

Nexus Repository provided by Sonatype contains the following vulnerability.
  • Server-side request forgery (CWE-918) - CVE-2026-0600
Kazuma Matsumoto of GMO Cybersecurity by IERAE, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 7.6 (High) [IPA Score]
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: High
  • User Interaction: None
  • Scope: Changed
  • Confidentiality Impact: High
  • Integrity Impact: Low
  • Availability Impact: None
Affected Products


Sonatype Inc.
  • Nexus 3.0.0 and later versions (both Community Edition and Professional Edition are affected)

Impact

The remote storage URL can be configured to point to some network destination, such as cloud meta data services or inside the local networks, which are not expected to be accessed from the product.
Solution

[Update and Configure the Software Appropriately]
The version 3.88.0 introduces optional URL validation functionality.
Update the software to version 3.88.0 or later, and configure this URL validation properly.
For more information, refer to the information provided by the developer.
Vendor Information

Sonatype Inc.
CWE (What is CWE?)

  1. No Mapping(CWE-Other) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2026-0600
References

  1. JVN : JVN#64861120
Revision History

  • [2026/02/02]
      Web page was published