DEBIAN-CVE-2025-68458

Source
https://security-tracker.debian.org/tracker/CVE-2025-68458
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-68458.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-68458
Upstream
Published
2026-02-05T23:15:53.940Z
Modified
2026-02-06T22:30:10.067921Z
Severity
  • 3.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Webpack is a module bundler. From version 5.49.0 to before 5.104.1, when experiments.buildHttp is enabled, webpack’s HTTP(S) resolver (HttpUriPlugin) can be bypassed to fetch resources from hosts outside allowedUris by using crafted URLs that include userinfo (username:password@host). If allowedUris enforcement relies on a raw string prefix check (e.g., uri.startsWith(allowed)), a URL that looks allow-listed can pass validation while the actual network request is sent to a different authority/host after URL parsing. This is a policy/allow-list bypass that enables build-time SSRF behavior (outbound requests from the build machine to internal-only endpoints, depending on network access) and untrusted content inclusion (the fetched response is treated as module source and bundled). This issue has been patched in version 5.104.1.

References

Affected packages

Debian:11 / node-webpack

Package

Name
node-webpack
Purl
pkg:deb/debian/node-webpack?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*
4.43.0-6
4.43.0-6+deb11u1
4.43.0-7
5.*
5.6.0+~cs6.4.0-1~exp1
5.6.0+~cs6.4.0-1~exp2
5.58.2+~cs5.11.7-1
5.65.0+dfsg+~cs9.20.9-1
5.65.0+dfsg+~cs9.20.9-2
5.65.0+dfsg+~cs9.20.9-3
5.65.0+dfsg+~cs9.20.9-4
5.65.0+dfsg+~cs9.20.9-5
5.65.0+dfsg+~cs9.20.9-6
5.65.0+dfsg+~cs9.20.9-7
5.65.0+dfsg+~cs9.20.9-8
5.65.0+dfsg+~cs9.20.9-9
5.65.0+dfsg+~cs9.20.9-10
5.65.0+dfsg+~cs9.20.9-11
5.65.0+dfsg+~cs9.20.9-12
5.65.0+dfsg+~cs9.20.9-13
5.74.0+dfsg+~cs10.13.6-1
5.74.0+dfsg+~cs10.13.6-2
5.74.0+dfsg+~cs10.13.6-3
5.74.0+dfsg+~cs10.13.6-4
5.74.0+repack1+~cs9.13.6-1
5.75.0+dfsg+~cs10.3.6-1
5.75.0+dfsg+~cs17.16.14-1
5.76.1+dfsg1+~cs17.16.16-1
5.76.1+dfsg2+~cs10.8.15-2
5.76.1+dfsg2+~cs10.8.15-3
5.94.0+dfsg1+~cs11.18.26-1
5.94.0+dfsg1+~cs11.18.26-2
5.95.0+dfsg1+~cs11.18.26-1
5.96.1+dfsg1+~cs11.18.26-1
5.97.1+dfsg1+~cs11.18.27-1
5.97.1+dfsg1+~cs11.18.27-2
5.97.1+dfsg1+~cs11.18.27-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-68458.json"

Debian:12 / node-webpack

Package

Name
node-webpack
Purl
pkg:deb/debian/node-webpack?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.75.0+dfsg+~cs17.16.14-1
5.75.0+dfsg+~cs17.16.14-1+deb12u1
5.76.1+dfsg1+~cs17.16.16-1
5.76.1+dfsg2+~cs10.8.15-2
5.76.1+dfsg2+~cs10.8.15-3
5.94.0+dfsg1+~cs11.18.26-1
5.94.0+dfsg1+~cs11.18.26-2
5.95.0+dfsg1+~cs11.18.26-1
5.96.1+dfsg1+~cs11.18.26-1
5.97.1+dfsg1+~cs11.18.27-1
5.97.1+dfsg1+~cs11.18.27-2
5.97.1+dfsg1+~cs11.18.27-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-68458.json"

Debian:13 / node-webpack

Package

Name
node-webpack
Purl
pkg:deb/debian/node-webpack?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.97.1+dfsg1+~cs11.18.27-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-68458.json"

Debian:14 / node-webpack

Package

Name
node-webpack
Purl
pkg:deb/debian/node-webpack?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.97.1+dfsg1+~cs11.18.27-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-68458.json"