Description
Firecrawl turns entire websites into LLM-ready markdown or structured data. Prior to version 2.0.1, a server-side request forgery (SSRF) vulnerability was discovered in Firecrawl's webhook functionality. Authenticated users could configure a webhook to an internal URL and send POST requests with arbitrary headers, which may have allowed access to internal systems. This has been fixed in version 2.0.1. If upgrading is not possible, it is recommend to isolate Firecrawl from any sensitive internal systems.
References (4)
Core 4
Core References
Vendor Advisory x_refsource_confirm
https://github.com/firecrawl/firecrawl/security/advisories/GHSA-p2wg-prhf-jx79
Patch x_refsource_misc
https://github.com/firecrawl/firecrawl/commit/b15fae51a760e9810a66bbfde5d5693d0df3fbeb
Patch x_refsource_misc
https://github.com/firecrawl/firecrawl/commit/e8cf0985b07968061a6b684b58097732e827ed46
Release Notes x_refsource_misc
https://github.com/firecrawl/firecrawl/releases/tag/v2.0.1
Scores
CVSS v3
6.3
EPSS
0.0007
EPSS Percentile
20.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-918
Status
published
Products (1)
firecrawl/firecrawl
< 2.0.1
Published
Aug 26, 2025
Tracked Since
Feb 18, 2026