Cyber Posture

CVE-2025-2691

HighPublic PoC

Published: 23 March 2025

Published
23 March 2025
Modified
29 April 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0003 7.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-2691, published on 2025-03-23, affects versions of the JavaScript package nossrf prior to 1.0.4. This vulnerability is a Server-Side Request Forgery (SSRF) issue classified under CWE-918, where an attacker can bypass the package's SSRF protection mechanism by supplying a hostname that resolves to a local or reserved IP address space. The flaw carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high severity due to its network accessibility, low attack complexity, and lack of prerequisites.

Unauthenticated attackers with network access can exploit this vulnerability without user interaction. By providing malicious hostnames to the affected nossrf package, they can circumvent SSRF mitigations, enabling requests to internal or reserved IP spaces. This achieves high confidentiality impact by potentially exposing sensitive internal resources and low integrity impact through limited manipulation capabilities.

The Snyk security advisory at https://security.snyk.io/vuln/SNYK-JS-NOSSRF-9510842 details the vulnerability and confirms that it is remediated in nossrf version 1.0.4. Practitioners should upgrade to this version or later in affected applications to prevent exploitation.

Details

CWE(s)
CWE-918

Affected Products

nossrf project
nossrf
≤ 1.0.4

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SSRF vulnerability in public-facing JavaScript package enables exploitation of applications to access internal resources.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References