Versions of SvelteKit are vulnerable to a server side request forgery (SSRF) and denial of service (DoS) under certain conditions.
Affected versions from 2.44.0 onwards are vulnerable to DoS if:
export const prerender = true)Affected versions from 2.19.0 onwards are vulnerable to DoS and SSRF if:
export const prerender = true)adapter-node without a configured ORIGIN environment variable, and you are not using a reverse proxy that implements Host header validationThe DoS causes the running server process to end.
The SSRF allows access to internal services that can be reached without authentication when fetched from SvelteKit's server runtime.
It is also possible to obtain an SXSS via cache poisoning, by forcing a potential CDN to cache an XSS returned by the attacker's server (the latter being able to specify the cache-control of their choice).
{
"nvd_published_at": "2026-01-15T19:16:03Z",
"github_reviewed_at": "2026-01-15T18:09:59Z",
"github_reviewed": true,
"severity": "HIGH",
"cwe_ids": [
"CWE-248",
"CWE-400",
"CWE-918"
]
}