WhisperX tag archive

#Webhook

This page collects WhisperX intelligence signals tagged #Webhook. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (8)

The Lab · 2026-03-26 03:27:09 · GitHub Issues

1. GitHub Security Alert: Merchant Webhook SSRF Vulnerability Exposes Internal Server Port Scanning

A critical Server-Side Request Forgery (SSRF) vulnerability has been identified in a GitHub repository's webhook system. The flaw allows a merchant to specify a webhook URL pointing to `127.0.0.1` or other loopback addresses, which could force the application's API to perform port scans against its own server instance....

The Lab · 2026-03-27 23:27:16 · GitHub Issues

2. [CRITICAL] Webhook Handler SSRF Vulnerability: Unvalidated URLs Allow Internal Network Access

A critical Server-Side Request Forgery (SSRF) vulnerability exists in the webhook creation handler, allowing attackers to force the server to make HTTP requests to internal network addresses. The flaw is located in `internal/handlers/webhook.go` at lines 65-69, where the handler fails to validate the scheme or destinat...

The Lab · 2026-03-29 14:27:03 · GitHub Issues

3. Sentinel: Critical Webhook Token Vulnerability Exposed in Production Code

A critical security vulnerability was discovered in the application's Meta webhook integration, where a guessable default string could allow attackers to bypass endpoint verification. The flaw resided in the `api/webhooks.ts` file, which used the hardcoded fallback value `'your-webhook-verify-token-here'` for the `WEBH...

The Lab · 2026-04-15 04:22:34 · GitHub Issues

4. Security Flaw: IPv6 SSRF Bypass in Notification Webhook Validation Exposes Internal Networks

A critical security vulnerability in a notification handler's webhook URL validation allows attackers to bypass internal network protections using IPv6 addresses. The flaw, marked as high severity, resides in the `notifications:save-webhook` IPC handler within the codebase. The validation logic incorrectly compares the...

The Lab · 2026-04-24 22:54:06 · GitHub Issues

5. Atlas Webhook Plugin Flaw: Missing Rate Limits Risk Unbounded LLM and Sandbox Costs After Secret Leak

A critical architectural weakness in the Atlas webhook plugin leaves the system exposed to unbounded agent invocations if a channel secret is compromised. The `POST /webhook/:channelId` endpoint — found in `plugins/webhook/src/routes.ts:115-236` — executes queries synchronously upon successful authentication, triggerin...

The Lab · 2026-04-30 04:54:10 · GitHub Issues

6. Critical Signature Bypass Exposes Linear Webhook Endpoint to Unauthenticated Exploitation Under Tailscale Funnel

A P0 vulnerability in the Linear webhook handler permits unauthenticated remote code execution-equivalent access through a signature verification bypass. The flaw, residing in `backend/routers/linear_webhook.py:82-101`, causes the `_verify_linear_signature` function to return `True` when both `signature_header` and `se...

The Lab · 2026-05-02 07:54:07 · GitHub Issues

7. Unverified Google Calendar Webhook Allows Forced Sync Injection in Cal.com Platform

A critical security gap has been identified in the Cal.com platform's Google Calendar webhook endpoint, potentially exposing users to unauthorized calendar manipulation. The vulnerability, classified as HIGH severity, exists in the `/api/webhook/google-calendar` route, where incoming webhook requests bypass essential s...

The Lab · 2026-05-13 11:48:30 · GitHub Issues

8. Critical SSRF Vulnerability in Webhook Engine Poses Tenant Isolation Risk Ahead of Customer Pilot

An architecture review has flagged a critical Server-Side Request Forgery (SSRF) vulnerability in the platform's automation engine that could expose internal infrastructure to tenant compromise. The flaw resides in the webhook action type, which allows customers to configure POST requests to arbitrary URLs. Security au...