PatchSiren cyber security CVE debrief
CVE-2026-44232 HackingRepo CVE debrief
CVE-2026-44232 is a high-severity SSRF defense bypass in the Node.js library dssrf-js. According to the public advisory, versions before 1.3.0 allow every IPv6 category to bypass the is_url_safe check. The issue is fixed in 1.3.0. The NVD record lists the vulnerability as Deferred and references the GitHub security advisory.
- Vendor
- HackingRepo
- Product
- dssrf-js
- CVSS
- HIGH 8.7
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-12
- Original CVE updated
- 2026-05-18
- Advisory published
- 2026-05-12
- Advisory updated
- 2026-05-18
Who should care
Security teams and developers using dssrf-js in applications that rely on is_url_safe to block unsafe destinations, especially where user-controlled URLs may include IPv6 addresses.
Technical summary
The advisory states that prior to version 1.3.0, every IPv6 category bypasses is_url_safe, weakening SSRF protection. This means applications using the library for URL safety checks may accept inputs they intended to reject when the target address is IPv6-related. The advisory maps the issue to CWE-791.
Defensive priority
High. If your application uses dssrf-js for SSRF filtering, upgrading to a fixed release should be treated as a priority remediation item because the flaw affects the core safety decision path.
Recommended defensive actions
- Upgrade dssrf-js to version 1.3.0 or later.
- Audit dependency manifests and lockfiles to find any transitive or pinned uses of affected versions.
- Review any code paths that depend on is_url_safe for SSRF prevention, with attention to IPv6 handling.
- Add or update tests that verify unsafe IPv6 targets are rejected by your SSRF controls.
- If immediate upgrade is not possible, apply compensating controls at a higher layer and treat URL input as untrusted until remediation is complete.
Evidence notes
The description is supported by the public advisory referenced from NVD: dssrf-js prior to 1.3.0 has an IPv6 category bypass in is_url_safe, and the fix is in 1.3.0. NVD identifies the record as Deferred and includes CWE-791 in the advisory metadata. The CVSS score provided with the CVE is 8.7 (High).
Official resources
-
CVE-2026-44232 CVE record
CVE.org
-
CVE-2026-44232 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
Publicly disclosed in the source record on 2026-05-12 and last modified on 2026-05-18. NVD currently marks the vulnerability status as Deferred.