๐Ÿ” CVE Alert

CVE-2026-43929

HIGH 8.2

ssrfcheck: Server-Side Request Forgery (SSRF) and Incomplete List of Disallowed Inputs

CVSS Score
8.2
EPSS Score
0.0%
EPSS Percentile
0th

ssrfcheck is a library that checks if a string contains a potential SSRF attack. In 1.3.0 and earlier, ssrfcheck fails to block Server-Side Request Forgery attacks when the target private IP address is encoded as an IPv4-mapped IPv6 address (e.g. http://[::ffff:127.0.0.1]/). The WHATWG URL parser built into Node.js silently normalizes the IPv4 notation inside the brackets to compressed hex form ([::ffff:7f00:1]) before the library's private-IP regex ever runs. The regex was written to match dot-notation only and therefore never matches any real input โ€” all seven IANA private IPv4 ranges, including the AWS/GCP/Azure metadata address 169.254.169.254, are bypassed. Any application using isSSRFSafeURL() to guard HTTP requests made with user-supplied URLs is fully exposed to SSRF.

CWE CWE-184 CWE-918
Vendor felippe-regazio
Product ssrfcheck
Published May 12, 2026
Last Updated May 13, 2026
Stay Ahead of the Next One

Get instant alerts for felippe-regazio ssrfcheck

Be the first to know when new high vulnerabilities affecting felippe-regazio ssrfcheck are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
None

Affected Versions

felippe-regazio / ssrfcheck
<= 1.3.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/felippe-regazio/ssrfcheck/security/advisories/GHSA-j4rj-2jr5-m439