Hemmelig is a messing app with with client-side encryption and self-destructing messages. Prior to version 7.3.3, a Server-Side Request Forgery (SSRF) filter bypass vulnerability exists in the webhook URL validation of the Secret Requests feature. The application attempts to block internal/private IP addresses but can be bypassed using DNS rebinding or open redirect services. This allows an authenticated user to make the server initiate HTTP requests to internal network resources. Version 7.3.3 contains a patch for the issue.
Metrics
Affected Vendors & Products
References
History
Tue, 06 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hemmelig
Hemmelig hemmelig |
|
| CPEs | cpe:2.3:a:hemmelig:hemmelig:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Hemmelig
Hemmelig hemmelig |
Mon, 29 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 29 Dec 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Hemmelig is a messing app with with client-side encryption and self-destructing messages. Prior to version 7.3.3, a Server-Side Request Forgery (SSRF) filter bypass vulnerability exists in the webhook URL validation of the Secret Requests feature. The application attempts to block internal/private IP addresses but can be bypassed using DNS rebinding or open redirect services. This allows an authenticated user to make the server initiate HTTP requests to internal network resources. Version 7.3.3 contains a patch for the issue. | |
| Title | Hemmelig has SSRF Filter bypass in Secret Request functionality | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-12-29T15:55:12.761Z
Updated: 2025-12-29T16:50:43.152Z
Reserved: 2025-12-29T14:50:49.039Z
Link: CVE-2025-69206
Updated: 2025-12-29T16:42:31.831Z
Status : Analyzed
Published: 2025-12-29T16:15:44.090
Modified: 2026-01-06T16:30:10.943
Link: CVE-2025-69206
No data.