| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4gx2-pc4f-wq37 | FastFeedParser has an infinite redirect loop DoS via meta-refresh chain |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kagisearch
Kagisearch fastfeedparser |
|
| Vendors & Products |
Kagisearch
Kagisearch fastfeedparser |
Tue, 07 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FastFeedParser is a high performance RSS, Atom and RDF parser. Prior to 0.5.10, when parse() fetches a URL that returns an HTML page containing a <meta http-equiv="refresh"> tag, it recursively calls itself with the redirect URL — with no depth limit, no visited-URL deduplication, and no redirect count cap. An attacker-controlled server that returns an infinite chain of HTML meta-refresh responses causes unbounded recursion, exhausting the Python call stack and crashing the process. This vulnerability can also be chained with the companion SSRF issue to reach internal network targets after bypassing the initial URL check. This vulnerability is fixed in 0.5.10. | |
| Title | FastFeedParser has an infinite redirect loop DoS via meta-refresh chain | |
| Weaknesses | CWE-674 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-08T19:22:49.417Z
Reserved: 2026-04-06T21:29:17.350Z
Link: CVE-2026-39376
Updated: 2026-04-08T19:17:58.606Z
Status : Awaiting Analysis
Published: 2026-04-07T20:16:32.450
Modified: 2026-04-08T21:27:00.663
Link: CVE-2026-39376
No data.
OpenCVE Enrichment
Updated: 2026-04-08T19:46:08Z
Github GHSA