Versions of the package ssrfcheck before 1.2.0 are vulnerable to Server-Side Request Forgery (SSRF) due to an incomplete denylist of IP address ranges. Specifically, the package fails to classify the reserved IP address space 224.0.0.0/4 (Multicast) as invalid. This oversight allows attackers to craft requests targeting these multicast addresses.
Metrics
Affected Vendors & Products
References
History
Tue, 29 Jul 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ssrfcheck
Ssrfcheck ssrfcheck |
|
Vendors & Products |
Ssrfcheck
Ssrfcheck ssrfcheck |
Mon, 28 Jul 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 28 Jul 2025 05:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Versions of the package ssrfcheck before 1.2.0 are vulnerable to Server-Side Request Forgery (SSRF) due to an incomplete denylist of IP address ranges. Specifically, the package fails to classify the reserved IP address space 224.0.0.0/4 (Multicast) as invalid. This oversight allows attackers to craft requests targeting these multicast addresses. | |
Weaknesses | CWE-918 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: snyk
Published: 2025-07-28T05:00:00.992Z
Updated: 2025-07-28T16:01:35.358Z
Reserved: 2025-07-27T12:56:36.513Z
Link: CVE-2025-8267

Updated: 2025-07-28T16:01:31.611Z

Status : Awaiting Analysis
Published: 2025-07-28T05:16:20.673
Modified: 2025-07-29T14:14:29.590
Link: CVE-2025-8267

No data.