| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.openhab.ui.bundles:org.openhab.ui.cometvisu | maven | <= 4.2.0 | 4.2.1 |
The vulnerability stems from the proxy endpoint in ProxyResource.java handling requests without authentication (CWE-918). The pre-patch code accepted arbitrary 'url' parameters without proper validation or whitelisting, enabling SSRF. The XSS vector was possible because responses were served through the CometVisu UI's origin. The commit added 1) authentication requirements via @RolesAllowed, 2) a proxy whitelist check using regex patterns, and 3) security headers - all absent in vulnerable versions. The function's direct handling of external HTTP requests without these safeguards made it the clear vulnerability source.
KEV Misses 88% of Exploited CVEs- Get the report