CVE-2022-41906
OpenSearch vulnerability analysis and mitigation

Overview

A potential Server-Side Request Forgery (SSRF) vulnerability was discovered in the OpenSearch Notifications Plugin (CVE-2022-41906), affecting versions 2.0.0 through 2.2.1. The vulnerability could allow privileged users to enumerate listening services or interact with configured resources via HTTP requests beyond the plugin's intended scope. The issue was discovered and disclosed in 2022, with the fix being implemented in OpenSearch version 2.2.1 (GitHub Advisory).

Technical details

The vulnerability exists in the OpenSearch Notifications Plugin, which enables other plugins to send notifications via Email, Slack, Amazon Chime, and Custom web-hook channels. The issue specifically relates to the host deny list functionality (opensearch.notifications.core.http.hostdenylist) which is designed to block specific IPs or IP ranges. The vulnerability allowed bypass of this security control through hostname resolution, potentially enabling unauthorized access to restricted resources (CVE Mitre). The vulnerability has been assigned a CVSS v3.0 base score of 7.7 (High), with the vector string CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N (GitHub Advisory).

Impact

The vulnerability could allow privileged users to bypass intended security controls and perform unauthorized actions, including enumerating listening services and interacting with configured resources beyond the plugin's intended scope. This could potentially lead to unauthorized access to sensitive information and systems (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in OpenSearch version 2.2.1 and later releases. The fix includes improvements to host resolution checking against the deny list and disabling of redirect following for webhooks. No alternative workarounds are recommended, and users are advised to upgrade to a patched version (GitHub PR 496, GitHub PR 507).

Additional resources


SourceThis report was generated using AI

Related OpenSearch vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-9624HIGH8.3
  • JavaJava
  • opensearch-2
NoYesNov 25, 2025
CVE-2023-31141MEDIUM5.9
  • JavaJava
  • org.opensearch.plugin:opensearch-security
NoYesMay 08, 2023
CVE-2023-45807MEDIUM5.4
  • JavaJava
  • opensearch
NoYesOct 16, 2023
CVE-2023-25806MEDIUM5.3
  • JavaJava
  • opensearch
NoYesMar 02, 2023
CVE-2023-23933MEDIUM4.3
  • NixOSNixOS
  • cpe:2.3:a:amazon:opensearch
NoYesFeb 03, 2023

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management