🔐 CVE Alert

CVE-2025-34469

UNKNOWN 0.0

Cowrie < 2.9.0 Unrestricted wget/curl Emulation Enables SSRF-Based DDoS Amplification

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Cowrie versions prior to 2.9.0 contain a server-side request forgery (SSRF) vulnerability in the emulated shell implementation of wget and curl. In the default emulated shell configuration, these command emulations perform real outbound HTTP requests to attacker-supplied destinations. Because no outbound request rate limiting was enforced, unauthenticated remote attackers could repeatedly invoke these commands to generate unbounded HTTP traffic toward arbitrary third-party targets, allowing the Cowrie honeypot to be abused as a denial-of-service amplification node and masking the attacker’s true source address behind the honeypot’s IP.

CWE CWE-918
Vendor cowrie
Product cowrie
Published Dec 31, 2025
Last Updated Mar 5, 2026
Stay Ahead of the Next One

Get instant alerts for cowrie cowrie

Be the first to know when new unknown vulnerabilities affecting cowrie cowrie are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Cowrie / Cowrie
0 < 2.9.0

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/advisories/GHSA-83jg-m2pm-4jxj github.com: https://github.com/cowrie/cowrie/releases/tag/v2.9.0 github.com: https://github.com/cowrie/cowrie/pull/2800 github.com: https://github.com/cowrie/cowrie/issues/2622 vulncheck.com: https://www.vulncheck.com/advisories/cowrie-unrestricted-wget-curl-emulation-enables-ssrf-based-ddos-amplification

Credits

Abraham Gebrehiwot and Filippo Lauria (Institute of Informatics and Telematics, Italian National Research Council (CNR)) Michele Castellaneta, Claudio Porta, and Sara Afzal (Institute of Informatics and Telematics, Italian National Research Council (CNR))