CVE-2025-57818

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-57818
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-57818.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-57818
Aliases
  • GHSA-p2wg-prhf-jx79
Published
2025-08-26T18:15:47Z
Modified
2025-08-27T09:59:34.698447Z
Summary
[none]
Details

Firecrawl turns entire websites into LLM-ready markdown or structured data. Prior to version 2.0.1, a server-side request forgery (SSRF) vulnerability was discovered in Firecrawl's webhook functionality. Authenticated users could configure a webhook to an internal URL and send POST requests with arbitrary headers, which may have allowed access to internal systems. This has been fixed in version 2.0.1. If upgrading is not possible, it is recommend to isolate Firecrawl from any sensitive internal systems.

References

Affected packages

Git / github.com/firecrawl/firecrawl

Affected ranges

Type
GIT
Repo
https://github.com/firecrawl/firecrawl
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

1.*

1.4.1

v.*

v.1.3.0

v1.*

v1.0.0
v1.1.0
v1.1.1
v1.10.0
v1.11.0
v1.12.0
v1.13.0
v1.14.0
v1.15.0
v1.2.0
v1.2.1
v1.4.0
v1.4.2
v1.4.3
v1.4.4
v1.5.0
v1.6.0
v1.7.0
v1.8.0
v1.9.0

v2.*

v2.0.0