CVE-2024-8952
Published: 20 March 2025
Description
Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data.
Security Summary
CVE-2024-8952 is a Server-Side Request Forgery (SSRF) vulnerability, mapped to CWE-918, affecting composiohq/composio version v0.4.2. The flaw exists specifically in the /api/actions/execute/WEBTOOL_SCRAPE_WEBSITE_CONTENT endpoint. Published on 2025-03-20, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), reflecting high confidentiality impact from network-accessible exploitation with low complexity and no privileges or user interaction required.
An unauthenticated remote attacker can exploit this SSRF vulnerability by sending crafted requests to the affected endpoint. This enables the attacker to read arbitrary files on the server, access AWS instance metadata services, and interact with other local services running on the host system.
Details on mitigation and patches are available in the advisory published on Huntr.com at https://huntr.com/bounties/d1acdd38-10d7-45df-9df0-9fc71f0e1c2a.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
SSRF in public-facing /api endpoint directly enables T1190; facilitates local file reads (T1005) and AWS instance metadata access (T1552.005).