Flowise: SSRF Protection Bypass via Unprotected Built-in HTTP Modules in Custom Function Sandbox

CVSS 7.1 flowise-components View details

Atlassian has SSRF via unvalidated X-Atlassian-Jira-Url / X-Atlassian-Confluence-Url headers

CVSS 8.2 mcp-atlassian View details

customized large language model flow. Prior to 3.1.0, a Server-Side Request Forgery (SSRF) protection bypass vulnerability exists in the Custom Function feature. While the application implements SSRF protection

CVSS 8.3 flowise View details

Flowise: APIChain Prompt Injection SSRF in GET/POST API Chains

CVSS 7.1 flowise-components View details

PraisonAI has an SSRF bypass

praisonaiagents View details

Open WebUI vulnerable to Server-Side Request Forgery (SSRF) via Arbitrary URL Processing in /api/v1/retrieval/process/web

CVSS 8.5 open-webui View details

source, AI chat framework. Versions of lobe-chat prior to 1.19.13 have an unauthorized ssrf vulnerability. An attacker can construct malicious requests to cause SSRF without logging in, attack intranet

CVSS 8.6 lobe_chat View details

IPv4-mapped IPv6 addresses bypass SSRF protection in validateUrlSync(), enabling full SSRF for SDK embedders

CVSS 8.5 n8n-mcp View details

PraisonAI Vulnerable to Server-Side Request Forgery via Unvalidated webhook

CVSS 7.2 PraisonAI View details

OpenClaw: SSRF via Unguarded Configured Base URLs in Multiple Channel Extensions (Incomplete

affected by path traversal, redirect-following SSRF, and telemetry payload exposure

CVSS 8.3 n8n-mcp View details

core security wrappers (secureAxiosRequest and secureFetch) intended to prevent Server-Side Request Forgery (SSRF) contain multiple logic flaws. These flaws allow attackers to bypass the allow/deny lists via DNS Rebinding

CVSS 7.1 flowise View details

customized large language model flow. Prior to 3.1.0, a Server-Side Request Forgery (SSRF) vulnerability exists in FlowiseAI's POST/GET API Chain components that allows unauthenticated attackers to force

CVSS 8.3 flowise View details

Flowise: SSRF Protection Bypass (TOCTOU & Default Insecure

CVSS 7.1 flowise-components View details

PraisonAIAgents: SSRF via unvalidated URL in `web_crawl` httpx fallback

praisonaiagents View details

authenticated SSRF via instance-URL header in multi-tenant HTTP mode

CVSS 8.5 n8n-mcp View details

ranges (RFC 1918), localhost, or cloud metadata endpoints. This enables Server-Side Request Forgery (SSRF), allowing any user interacting with a publicly exposed chatflow to force

CVSS 8.8 flowise-components View details

package designed for quick prototyping. Prior to version 6.6.0, a Server-Side Request Forgery (SSRF) vulnerability in Gradio allows an attacker to make arbitrary HTTP requests from a victim

CVSS 8.6 gradio View details

speech voice models. In versions prior to 1.16.0, a Server-Side Request Forgery (SSRF) vulnerability in the asset download endpoint allows authenticated users to make arbitrary HTTP requests from

CVSS 8.5 sillytavern View details

workflows with Generative AI. From 0.0.26 to before 1.56.0, aServer-Side Request Forgery (SSRF) vulnerability exists in Pydantic AI's URL download functionality. When applications accept message history from untrusted

CVSS 8.6 pydantic_ai View details
Page 1 of 2 Next