Логотип exploitDog
bind:CVE-2025-6087
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-6087

Количество 3

Количество 3

nvd логотип

CVE-2025-6087

6 месяцев назад

A Server-Side Request Forgery (SSRF) vulnerability was identified in the @opennextjs/cloudflare package. The vulnerability stems from an unimplemented feature in the Cloudflare adapter for Open Next, which allowed unauthenticated users to proxy arbitrary remote content via the /_next/image endpoint. This issue allowed attackers to load remote resources from arbitrary hosts under the victim site’s domain for any site deployed using the Cloudflare adapter for Open Next.  For example: https://victim-site.com/_next/image?url=https://attacker.com In this example, attacker-controlled content from attacker.com is served through the victim site’s domain (victim-site.com), violating the same-origin policy and potentially misleading users or other services. Impact: * SSRF via unrestricted remote URL loading * Arbitrary remote content loading * Potential internal service exposure or phishing risks through domain abuse Mitigation: The following mitigatio

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-rvpw-p7vw-wj3m

6 месяцев назад

OpenNext for Cloudflare (opennextjs-cloudflare) has a SSRF vulnerability via /_next/image endpoint

EPSS: Низкий
fstec логотип

BDU:2025-06872

6 месяцев назад

Уязвимость пакета opennextjs сервиса балансировки сетевого трафика для веб-приложений Cloudflare, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-6087

A Server-Side Request Forgery (SSRF) vulnerability was identified in the @opennextjs/cloudflare package. The vulnerability stems from an unimplemented feature in the Cloudflare adapter for Open Next, which allowed unauthenticated users to proxy arbitrary remote content via the /_next/image endpoint. This issue allowed attackers to load remote resources from arbitrary hosts under the victim site’s domain for any site deployed using the Cloudflare adapter for Open Next.  For example: https://victim-site.com/_next/image?url=https://attacker.com In this example, attacker-controlled content from attacker.com is served through the victim site’s domain (victim-site.com), violating the same-origin policy and potentially misleading users or other services. Impact: * SSRF via unrestricted remote URL loading * Arbitrary remote content loading * Potential internal service exposure or phishing risks through domain abuse Mitigation: The following mitigatio

CVSS3: 9.1
0%
Низкий
6 месяцев назад
github логотип
GHSA-rvpw-p7vw-wj3m

OpenNext for Cloudflare (opennextjs-cloudflare) has a SSRF vulnerability via /_next/image endpoint

0%
Низкий
6 месяцев назад
fstec логотип
BDU:2025-06872

Уязвимость пакета opennextjs сервиса балансировки сетевого трафика для веб-приложений Cloudflare, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.3
0%
Низкий
6 месяцев назад

Уязвимостей на страницу