Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j62c-4x62-9r35

Опубликовано: 15 янв. 2026
Источник: github
Github: Прошло ревью
CVSS4: 8.4

Описание

SvelteKit is vulnerable to denial of service and possible SSRF when using prerendering

Summary

Versions of SvelteKit are vulnerable to a server side request forgery (SSRF) and denial of service (DoS) under certain conditions.

Details

Affected versions from 2.44.0 onwards are vulnerable to DoS if:

  • your app has at least one prerendered route (export const prerender = true)

Affected versions from 2.19.0 onwards are vulnerable to DoS and SSRF if:

  • your app has at least one prerendered route (export const prerender = true)
  • AND you are using adapter-node without a configured ORIGIN environment variable, and you are not using a reverse proxy that implements Host header validation

Impact

The DoS causes the running server process to end.

The SSRF allows access to internal services that can be reached without authentication when fetched from SvelteKit's server runtime.

It is also possible to obtain an SXSS via cache poisoning, by forcing a potential CDN to cache an XSS returned by the attacker's server (the latter being able to specify the cache-control of their choice).

Credits

Пакеты

Наименование

@sveltejs/kit

npm
Затронутые версииВерсия исправления

>= 2.19.0, <= 2.49.4

2.49.5

Наименование

@sveltejs/adapter-node

npm
Затронутые версииВерсия исправления

>= 5.4.1, <= 5.5.0

5.5.1

EPSS

Процентиль: 4%
0.00018
Низкий

8.4 High

CVSS4

Дефекты

CWE-248
CWE-400
CWE-918

Связанные уязвимости

CVSS3: 9.1
nvd
23 дня назад

SvelteKit is a framework for rapidly developing robust, performant web applications using Svelte. Prior to 2.49.5, SvelteKit is vulnerable to a server side request forgery (SSRF) and denial of service (DoS) under certain conditions. From 2.44.0 through 2.49.4, the vulnerability results in a DoS when your app has at least one prerendered route (export const prerender = true). From 2.19.0 through 2.49.4, the vulnerability results in a DoS when your app has at least one prerendered route and you are using adapter-node without a configured ORIGIN environment variable, and you are not using a reverse proxy that implements Host header validation. This vulnerability is fixed in 2.49.5.

EPSS

Процентиль: 4%
0.00018
Низкий

8.4 High

CVSS4

Дефекты

CWE-248
CWE-400
CWE-918