Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

448+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-5016: elecV2P SSRF Vulnerability in URL Handler Allows Remote Attack
CVE-2026-5016: elecV2P SSRF Vulnerability in URL Handler Allows Remote Attack
SECURITYHIGHCVE-2026-5016

CVE-2026-5016: elecV2P SSRF Vulnerability in URL Handler Allows Remote Attack

A server-side request forgery vulnerability in elecV2P up to version 3.8.3 allows remote attackers to manipulate the eAxios function via the /mock endpoint's req argument. A public exploit is available.

Dylan H.

Security Team

March 29, 2026
5 min read

Affected Products

  • elecV2P <= 3.8.3

Executive Summary

A server-side request forgery (SSRF) vulnerability has been identified in elecV2P, a popular JavaScript automation tool used for running rules, fetching remote resources, and managing web automation tasks. The flaw, tracked as CVE-2026-5016, is present in all versions up to and including 3.8.3 and carries a CVSS score of 7.3 (High).

The vulnerability exists in the eAxios function within the /mock component's URL Handler. By manipulating the req argument, an unauthenticated remote attacker can trigger the server to initiate arbitrary HTTP requests to internal or external resources — a classic SSRF pattern. A public exploit is already available, raising the exploitation risk for unpatched deployments.

CVSS Score: 7.3 (High)


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-5016
CVSS Score7.3 (High)
TypeCWE-918: Server-Side Request Forgery (SSRF)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Component/mock endpoint — URL Handler (eAxios function)
ExploitPublicly available

Affected Versions

ProductAffected VersionsFixed Version
elecV2P elecV2P<= 3.8.3Not confirmed at time of disclosure

What Is elecV2P?

elecV2P is a JavaScript-based automation platform commonly used for:

  • Running rewrite rules (similar to Surge/Quantumult X)
  • Fetching and caching remote JavaScript tasks
  • Proxying HTTP/HTTPS requests for script execution
  • Web automation workflows triggered via HTTP endpoints

The tool's /mock endpoint is used to simulate or proxy HTTP requests, making it a natural attack surface for SSRF exploitation.


Technical Analysis

Root Cause

The eAxios function in elecV2P's URL Handler accepts user-supplied input via the req argument without adequate validation or allowlisting. When a request is sent to the /mock endpoint with a crafted req value, the server initiates an HTTP request to the attacker-specified destination.

Attack path:
  Attacker → HTTP request to /mock endpoint
           → Manipulates `req` argument with target URL
           → elecV2P server calls eAxios(req) with attacker URL
           → Server makes outbound HTTP request to attacker-controlled or internal URL
           → Response returned to attacker (data exfiltration)

SSRF Impact Scenarios

ScenarioDescription
Internal network scanningProbe internal services (169.254.x.x, 10.x.x.x, 172.16.x.x)
Cloud metadata exfiltrationAccess AWS/GCP/Azure IMDS at 169.254.169.254 to steal credentials
Internal API abuseAccess unexposed admin APIs and management interfaces
Port scanningEnumerate open ports on internal hosts via response timing
Credential harvestingRead internal secrets from unauthenticated services
Bypass IP allowlistsUse the server as a proxy to bypass network-level access controls

Example Attack Vector

An attacker targeting a cloud-hosted elecV2P instance could exploit the SSRF to access the cloud provider's instance metadata service:

POST /mock
Content-Type: application/json

{
  "req": {
    "url": "http://169.254.169.254/latest/meta-data/iam/security-credentials/",
    "method": "GET"
  }
}

If successful, the server returns IAM credential data including temporary access tokens, enabling full AWS API access with the instance's assigned role.


Attack Surface

elecV2P is often deployed in environments where it has access to internal network resources, making SSRF particularly impactful:

  • Self-hosted automation environments — may have network access to databases, message queues, or admin panels
  • Container deployments — internal Docker networks expose services on private RFC1918 space
  • Cloud VMs — IMDS endpoint accessible from the instance
  • Development environments — often less hardened than production, exposing dev-only services

Immediate Remediation

1. Update elecV2P

Update to the latest version of elecV2P once a patched release is available. Monitor the official repository at GitHub for release announcements.

2. Restrict Network Egress (Immediate Mitigation)

Until a patch is applied, restrict outbound connections from the elecV2P host:

# Example: Block access to cloud metadata and RFC1918 via iptables
iptables -A OUTPUT -d 169.254.169.254 -j DROP
iptables -A OUTPUT -d 10.0.0.0/8 -j DROP
iptables -A OUTPUT -d 172.16.0.0/12 -j DROP
iptables -A OUTPUT -d 192.168.0.0/16 -j DROP

3. Authentication and Access Control

If the /mock endpoint does not require authentication, restrict access to trusted IP addresses only:

# Nginx: Restrict /mock to internal IPs only
location /mock {
    allow 10.0.0.0/8;
    allow 127.0.0.1;
    deny all;
}

4. Deploy a Web Application Firewall

Use a WAF or reverse proxy to inspect and block requests containing private IP ranges or metadata endpoints in the req parameter.


Detection

Monitor for exploitation attempts targeting the /mock endpoint:

# Suspicious patterns in access logs
POST /mock   # With body containing:
  - 169.254.169.254 (IMDS)
  - 127.0.0.1 / localhost
  - RFC1918 ranges: 10.x, 172.16.x, 192.168.x
  - file:// URIs (local file read attempts)
  - dict:// or gopher:// URIs (advanced SSRF)

Unexpected outbound connections from the elecV2P process to internal or metadata endpoints are strong indicators of active exploitation.


Key Takeaways

  1. CVE-2026-5016 is a network-exploitable SSRF in elecV2P up to version 3.8.3 requiring no authentication
  2. A public exploit exists — exposure window is narrow; patch or mitigate immediately
  3. Cloud-hosted deployments are at highest risk due to accessible IMDS endpoints
  4. Restrict egress and access to the /mock endpoint as an interim mitigation
  5. Monitor for unusual outbound HTTP requests from your elecV2P host

References

  • CVE-2026-5016 — NIST NVD
  • elecV2P GitHub Repository

Related Reading

  • CVE-2026-4177: YAML::Syck Heap Buffer Overflow RCE
  • Critical RCE in WPvivid Backup Plugin
#CVE#SSRF#elecV2P#NVD#High#Remote

Related Articles

CVE-2025-12886: Oxygen Theme SSRF Allows Unauthenticated Web Requests

A Server-Side Request Forgery vulnerability in the Oxygen Theme plugin for WordPress (all versions up to 6.0.8) enables unauthenticated attackers to make...

6 min read

CVE-2026-33875: Gematik Authenticator Authentication Flow Hijacking (CVSS 9.3)

A critical vulnerability in Gematik Authenticator prior to version 4.16.0 allows attackers to hijack authentication sessions via malicious deep links,...

5 min read

CVE-2026-33669: SiYuan Unauthenticated Document Content Exposure (CVSS 9.8)

A critical unauthenticated information disclosure vulnerability in SiYuan, the personal knowledge management system, allows remote attackers to retrieve...

4 min read
Back to all Security Alerts