πŸ” CVE Alert

CVE-2026-32857

HIGH 8.6

Firecrawl Playwright Service SSRF Protection Bypass via Missing Post-Redirect Validation

CVSS Score
8.6
EPSS Score
0.0%
EPSS Percentile
9th

Firecrawl version 2.8.0 and prior contain a server-side request forgery (SSRF) protection bypass vulnerability in the Playwright scraping service where network policy validation is applied only to the initial user-supplied URL and not to subsequent redirect destinations. Attackers can supply an externally valid URL that passes validation and returns an HTTP redirect to an internal or restricted resource, allowing the browser to follow the redirect and fetch the final destination without revalidation, thereby gaining access to internal network services and sensitive endpoints.Β This issue is distinct from CVE-2024-56800, which describes redirect-based SSRF generally. This vulnerability specifically arises from a post-redirect enforcement gap in implemented SSRF protections, where validation is applied only to the initial request and not to the final redirected destination.

CWE CWE-918
Vendor firecrawl
Product firecrawl
Published Mar 26, 2026
Last Updated Mar 30, 2026
Stay Ahead of the Next One

Get instant alerts for firecrawl firecrawl

Be the first to know when new high vulnerabilities affecting firecrawl firecrawl are published β€” delivered to Slack, Telegram or Discord.

Get Free Alerts β†’ Free Β· No credit card Β· 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

Firecrawl / Firecrawl
0 ≀ 2.8.0

References

NVD β†— CVE.org β†— EPSS Data β†—
firecrawl.dev: https://www.firecrawl.dev/ github.com: https://github.com/firecrawl/firecrawl/security/advisories/GHSA-vjp8-2wgg-p734 vulncheck.com: https://www.vulncheck.com/advisories/firecrawl-playwright-service-ssrf-protection-bypass-via-missing-post-redirect-validation

Credits

Eran Shimony, Palo Alto Networks