FKIE_CVE-2025-57818

Vulnerability from fkie_nvd - Published: 2025-08-26 18:15 - Updated: 2025-08-29 16:22
Summary
Firecrawl turns entire websites into LLM-ready markdown or structured data. Prior to version 2.0.1, a server-side request forgery (SSRF) vulnerability was discovered in Firecrawl's webhook functionality. Authenticated users could configure a webhook to an internal URL and send POST requests with arbitrary headers, which may have allowed access to internal systems. This has been fixed in version 2.0.1. If upgrading is not possible, it is recommend to isolate Firecrawl from any sensitive internal systems.
Impacted products
Vendor Product Version

{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Firecrawl turns entire websites into LLM-ready markdown or structured data. Prior to version 2.0.1, a server-side request forgery (SSRF) vulnerability was discovered in Firecrawl\u0027s webhook functionality. Authenticated users could configure a webhook to an internal URL and send POST requests with arbitrary headers, which may have allowed access to internal systems. This has been fixed in version 2.0.1. If upgrading is not possible, it is recommend to isolate Firecrawl from any sensitive internal systems."
    },
    {
      "lang": "es",
      "value": "Firecrawl convierte sitios web completos en Markdown o datos estructurados compatibles con LLM. Antes de la versi\u00f3n 2.0.1, se descubri\u00f3 una vulnerabilidad de server-side request forgery (SSRF) en la funcionalidad de webhook de Firecrawl. Los usuarios autenticados pod\u00edan configurar un webhook en una URL interna y enviar solicitudes POST con encabezados arbitrarios, lo que podr\u00eda haber permitido el acceso a sistemas internos. Esto se ha corregido en la versi\u00f3n 2.0.1. Si no es posible actualizar, se recomienda aislar Firecrawl de cualquier sistema interno sensible."
    }
  ],
  "id": "CVE-2025-57818",
  "lastModified": "2025-08-29T16:22:31.970",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 6.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.4,
        "source": "security-advisories@github.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-08-26T18:15:47.970",
  "references": [
    {
      "source": "security-advisories@github.com",
      "url": "https://github.com/firecrawl/firecrawl/commit/b15fae51a760e9810a66bbfde5d5693d0df3fbeb"
    },
    {
      "source": "security-advisories@github.com",
      "url": "https://github.com/firecrawl/firecrawl/commit/e8cf0985b07968061a6b684b58097732e827ed46"
    },
    {
      "source": "security-advisories@github.com",
      "url": "https://github.com/firecrawl/firecrawl/releases/tag/v2.0.1"
    },
    {
      "source": "security-advisories@github.com",
      "url": "https://github.com/firecrawl/firecrawl/security/advisories/GHSA-p2wg-prhf-jx79"
    }
  ],
  "sourceIdentifier": "security-advisories@github.com",
  "vulnStatus": "Awaiting Analysis",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-918"
        }
      ],
      "source": "security-advisories@github.com",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…