CVE-2025-57818 (GCVE-0-2025-57818)
Vulnerability from cvelistv5 – Published: 2025-08-26 17:52 – Updated: 2025-08-26 20:13
VLAI?
Title
Firecrawl SSRF Vulnerability via malicious webhook
Summary
Firecrawl turns entire websites into LLM-ready markdown or structured data. Prior to version 2.0.1, a server-side request forgery (SSRF) vulnerability was discovered in Firecrawl's webhook functionality. Authenticated users could configure a webhook to an internal URL and send POST requests with arbitrary headers, which may have allowed access to internal systems. This has been fixed in version 2.0.1. If upgrading is not possible, it is recommend to isolate Firecrawl from any sensitive internal systems.
Severity ?
6.3 (Medium)
CWE
- CWE-918 - Server-Side Request Forgery (SSRF)
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-57818",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-26T20:13:18.124450Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-26T20:13:29.759Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "firecrawl",
"vendor": "firecrawl",
"versions": [
{
"status": "affected",
"version": "\u003c 2.0.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Firecrawl turns entire websites into LLM-ready markdown or structured data. Prior to version 2.0.1, a server-side request forgery (SSRF) vulnerability was discovered in Firecrawl\u0027s webhook functionality. Authenticated users could configure a webhook to an internal URL and send POST requests with arbitrary headers, which may have allowed access to internal systems. This has been fixed in version 2.0.1. If upgrading is not possible, it is recommend to isolate Firecrawl from any sensitive internal systems."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-918",
"description": "CWE-918: Server-Side Request Forgery (SSRF)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-26T17:52:43.868Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/firecrawl/firecrawl/security/advisories/GHSA-p2wg-prhf-jx79",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/firecrawl/firecrawl/security/advisories/GHSA-p2wg-prhf-jx79"
},
{
"name": "https://github.com/firecrawl/firecrawl/commit/b15fae51a760e9810a66bbfde5d5693d0df3fbeb",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/firecrawl/firecrawl/commit/b15fae51a760e9810a66bbfde5d5693d0df3fbeb"
},
{
"name": "https://github.com/firecrawl/firecrawl/commit/e8cf0985b07968061a6b684b58097732e827ed46",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/firecrawl/firecrawl/commit/e8cf0985b07968061a6b684b58097732e827ed46"
},
{
"name": "https://github.com/firecrawl/firecrawl/releases/tag/v2.0.1",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/firecrawl/firecrawl/releases/tag/v2.0.1"
}
],
"source": {
"advisory": "GHSA-p2wg-prhf-jx79",
"discovery": "UNKNOWN"
},
"title": "Firecrawl SSRF Vulnerability via malicious webhook"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2025-57818",
"datePublished": "2025-08-26T17:52:43.868Z",
"dateReserved": "2025-08-20T14:30:35.011Z",
"dateUpdated": "2025-08-26T20:13:29.759Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-57818\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-08-26T18:15:47.970\",\"lastModified\":\"2025-08-29T16:22:31.970\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Firecrawl turns entire websites into LLM-ready markdown or structured data. Prior to version 2.0.1, a server-side request forgery (SSRF) vulnerability was discovered in Firecrawl\u0027s webhook functionality. Authenticated users could configure a webhook to an internal URL and send POST requests with arbitrary headers, which may have allowed access to internal systems. This has been fixed in version 2.0.1. If upgrading is not possible, it is recommend to isolate Firecrawl from any sensitive internal systems.\"},{\"lang\":\"es\",\"value\":\"Firecrawl convierte sitios web completos en Markdown o datos estructurados compatibles con LLM. Antes de la versi\u00f3n 2.0.1, se descubri\u00f3 una vulnerabilidad de server-side request forgery (SSRF) en la funcionalidad de webhook de Firecrawl. Los usuarios autenticados pod\u00edan configurar un webhook en una URL interna y enviar solicitudes POST con encabezados arbitrarios, lo que podr\u00eda haber permitido el acceso a sistemas internos. Esto se ha corregido en la versi\u00f3n 2.0.1. Si no es posible actualizar, se recomienda aislar Firecrawl de cualquier sistema interno sensible.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":6.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.8,\"impactScore\":3.4}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-918\"}]}],\"references\":[{\"url\":\"https://github.com/firecrawl/firecrawl/commit/b15fae51a760e9810a66bbfde5d5693d0df3fbeb\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/firecrawl/firecrawl/commit/e8cf0985b07968061a6b684b58097732e827ed46\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/firecrawl/firecrawl/releases/tag/v2.0.1\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/firecrawl/firecrawl/security/advisories/GHSA-p2wg-prhf-jx79\",\"source\":\"security-advisories@github.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-57818\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-26T20:13:18.124450Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-08-26T20:13:26.328Z\"}}], \"cna\": {\"title\": \"Firecrawl SSRF Vulnerability via malicious webhook\", \"source\": {\"advisory\": \"GHSA-p2wg-prhf-jx79\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"firecrawl\", \"product\": \"firecrawl\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 2.0.1\"}]}], \"references\": [{\"url\": \"https://github.com/firecrawl/firecrawl/security/advisories/GHSA-p2wg-prhf-jx79\", \"name\": \"https://github.com/firecrawl/firecrawl/security/advisories/GHSA-p2wg-prhf-jx79\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/firecrawl/firecrawl/commit/b15fae51a760e9810a66bbfde5d5693d0df3fbeb\", \"name\": \"https://github.com/firecrawl/firecrawl/commit/b15fae51a760e9810a66bbfde5d5693d0df3fbeb\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/firecrawl/firecrawl/commit/e8cf0985b07968061a6b684b58097732e827ed46\", \"name\": \"https://github.com/firecrawl/firecrawl/commit/e8cf0985b07968061a6b684b58097732e827ed46\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/firecrawl/firecrawl/releases/tag/v2.0.1\", \"name\": \"https://github.com/firecrawl/firecrawl/releases/tag/v2.0.1\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Firecrawl turns entire websites into LLM-ready markdown or structured data. Prior to version 2.0.1, a server-side request forgery (SSRF) vulnerability was discovered in Firecrawl\u0027s webhook functionality. Authenticated users could configure a webhook to an internal URL and send POST requests with arbitrary headers, which may have allowed access to internal systems. This has been fixed in version 2.0.1. If upgrading is not possible, it is recommend to isolate Firecrawl from any sensitive internal systems.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-918\", \"description\": \"CWE-918: Server-Side Request Forgery (SSRF)\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-08-26T17:52:43.868Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-57818\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-26T20:13:29.759Z\", \"dateReserved\": \"2025-08-20T14:30:35.011Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2025-08-26T17:52:43.868Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…