CVE-2025-69206

Source
https://cve.org/CVERecord?id=CVE-2025-69206
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-69206.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-69206
Aliases
Published
2025-12-29T15:55:12.761Z
Modified
2026-03-14T12:44:46.859364Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Hemmelig has SSRF Filter bypass in Secret Request functionality
Details

Hemmelig is a messing app with with client-side encryption and self-destructing messages. Prior to version 7.3.3, a Server-Side Request Forgery (SSRF) filter bypass vulnerability exists in the webhook URL validation of the Secret Requests feature. The application attempts to block internal/private IP addresses but can be bypassed using DNS rebinding or open redirect services. This allows an authenticated user to make the server initiate HTTP requests to internal network resources. Version 7.3.3 contains a patch for the issue.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-918"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/69xxx/CVE-2025-69206.json"
}
References

Affected packages

Git / github.com/hemmeligorg/hemmelig.app

Affected ranges

Type
GIT
Repo
https://github.com/hemmeligorg/hemmelig.app
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

cli-v1.*
cli-v1.0.0
cli-v1.0.1
v.*
v.1.0.1
v1.*
v1.0.0
v1.1.0
v1.1.1
v1.1.2
v1.2.0
v1.3.0
v1.3.1
v1.3.2
v1.3.3
v1.4.0
v1.5.0
v1.6.0
v1.6.1
v1.7.0
v1.8.0
v1.8.1
v1.8.2
v1.8.3
v1.8.4
v1.8.5
v1.9.0
v2.*
v2.0.0
v3.*
v3.0.0
v3.1.0
v3.2.0
v3.2.1
v3.3.0
v3.4.0
v3.5.0
v3.5.1
v3.6.0
v3.7.0
v3.8.0
v3.8.1
v4.*
v4.0.0
v4.1.0
v4.2.0
v4.3.0
v4.4.0
v5.*
v5.0.0
v5.1.0
v5.1.1
v5.10.0
v5.10.1
v5.10.2
v5.11.0
v5.11.1
v5.11.2
v5.11.3
v5.11.4
v5.11.5
v5.12.0
v5.12.1
v5.12.2
v5.13.0
v5.13.1
v5.13.2
v5.13.3
v5.13.4
v5.13.5
v5.14.0
v5.15.0
v5.15.1
v5.15.2
v5.15.3
v5.15.4
v5.15.5
v5.16.0
v5.16.1
v5.16.2
v5.16.3
v5.16.4
v5.16.5
v5.16.6
v5.16.7
v5.16.8
v5.17.0
v5.17.1
v5.17.10
v5.17.2
v5.17.3
v5.17.4
v5.17.5
v5.17.6
v5.17.7
v5.17.8
v5.17.9
v5.18.0
v5.18.1
v5.19.0
v5.19.1
v5.19.10
v5.19.11
v5.19.12
v5.19.13
v5.19.14
v5.19.15
v5.19.16
v5.19.17
v5.19.18
v5.19.19
v5.19.2
v5.19.20
v5.19.21
v5.19.22
v5.19.23
v5.19.24
v5.19.25
v5.19.26
v5.19.27
v5.19.28
v5.19.3
v5.19.4
v5.19.5
v5.19.6
v5.19.7
v5.19.8
v5.19.9
v5.2.0
v5.2.1
v5.2.2
v5.3.0
v5.3.1
v5.4.0
v5.4.1
v5.4.2
v5.4.3
v5.4.4
v5.5.0
v5.6.0
v5.6.1
v5.7.0
v5.7.1
v5.7.2
v5.8.0
v5.8.1
v5.8.2
v5.8.3
v5.8.4
v5.9.0
v5.9.1
v5.9.2
v6.*
v6.0.0
v6.0.1
v6.0.10
v6.0.2
v6.0.3
v6.0.4
v6.0.5
v6.0.6
v6.0.7
v6.0.8
v6.0.9
v6.1.0
v6.1.1
v6.1.2
v6.1.3
v6.1.4
v6.2.0
v6.2.1
v6.3.0
v6.3.1
v6.3.2
v6.4.0
v6.4.1
v6.4.2
v6.4.3
v6.5.0
v6.5.1
v6.5.2
v6.5.3
v6.5.4
v6.5.5
v6.6.0
v6.6.1
v6.7.0
v6.7.1
v6.7.2
v6.7.3
v6.7.4
v7.*
v7.0.0
v7.0.1
v7.0.10
v7.0.11
v7.0.12
v7.0.13
v7.0.14
v7.0.15
v7.0.16
v7.0.17
v7.0.18
v7.0.19
v7.0.2
v7.0.20
v7.0.3
v7.0.4
v7.0.5
v7.0.6
v7.0.7
v7.0.8
v7.0.9
v7.1.0
v7.2.0
v7.2.1
v7.2.2
v7.3.0
v7.3.1
v7.3.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-69206.json"