CVE-2025-57818

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-57818
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-57818.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-57818
Aliases
  • GHSA-p2wg-prhf-jx79
Published
2025-08-26T17:52:43.868Z
Modified
2025-12-05T10:20:29.997911Z
Severity
  • 6.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
Firecrawl SSRF Vulnerability via malicious webhook
Details

Firecrawl turns entire websites into LLM-ready markdown or structured data. Prior to version 2.0.1, a server-side request forgery (SSRF) vulnerability was discovered in Firecrawl's webhook functionality. Authenticated users could configure a webhook to an internal URL and send POST requests with arbitrary headers, which may have allowed access to internal systems. This has been fixed in version 2.0.1. If upgrading is not possible, it is recommend to isolate Firecrawl from any sensitive internal systems.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-918"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/57xxx/CVE-2025-57818.json"
}
References

Affected packages

Git / github.com/firecrawl/firecrawl

Affected ranges

Type
GIT
Repo
https://github.com/firecrawl/firecrawl
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.4.1

v.*

v.1.3.0

v1.*

v1.0.0
v1.1.0
v1.1.1
v1.10.0
v1.11.0
v1.12.0
v1.13.0
v1.14.0
v1.15.0
v1.2.0
v1.2.1
v1.4.0
v1.4.2
v1.4.3
v1.4.4
v1.5.0
v1.6.0
v1.7.0
v1.8.0
v1.9.0

v2.*

v2.0.0