Description
Versions of the package ssrfcheck before 1.2.0 are vulnerable to Server-Side Request Forgery (SSRF) due to an incomplete denylist of IP address ranges. Specifically, the package fails to classify the reserved IP address space 224.0.0.0/4 (Multicast) as invalid. This oversight allows attackers to craft requests targeting these multicast addresses.
References (4)
Core 4
Core References
Exploit, Third Party Advisory
https://gist.github.com/lirantal/2976840639df824cb3abe60d13c65e04
Issue Tracking
https://github.com/felippe-regazio/ssrfcheck/issues/5
Exploit, Third Party Advisory
https://security.snyk.io/vuln/SNYK-JS-SSRFCHECK-9510756
Scores
CVSS v3
8.2
EPSS
0.0012
EPSS Percentile
30.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-918
Status
published
Products (2)
felipperegazio/ssrf_check
< 1.2.0
npm/ssrfcheck
0 - 1.2.0npm
Published
Jul 28, 2025
Tracked Since
Feb 18, 2026