Versions of the package ssrfcheck before 1.2.0 are vulnerable to Server-Side Request Forgery (SSRF) due to an incomplete denylist of IP address ranges. Specifically, the package fails to classify the reserved IP address space 224.0.0.0/4 (Multicast) as invalid. This oversight allows attackers to craft requests targeting these multicast addresses.
{ "github_reviewed_at": "2025-07-28T16:42:51Z", "nvd_published_at": "2025-07-28T05:16:20Z", "github_reviewed": true, "cwe_ids": [ "CWE-918" ], "severity": "HIGH" }