CVE-2025-57814
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-25

Last updated on: 2025-08-26

Assigner: GitHub, Inc.

Description
request-filtering-agent is an http(s).Agent implementation that blocks requests to Private/Reserved IP addresses. Versions 1.x.x and earlier contain a vulnerability where HTTPS requests to 127.0.0.1 bypass IP address filtering, while HTTP requests are correctly blocked. This allows attackers to potentially access internal HTTPS services running on localhost, bypassing the library's SSRF protection. The vulnerability is particularly dangerous when the application accepts user-controlled URLs and internal services are only protected by network-level restrictions. This vulnerability has been fixed in request-filtering-agent version 2.0.0. Users should upgrade to version 2.0.0 or later.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-25
Last Modified
2025-08-26
Generated
2026-05-07
AI Q&A
2025-08-26
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
azu request-filtering-agent 1.1.2
azu request-filtering-agent 2.0.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability exists in the request-filtering-agent library versions 1.x.x and earlier, where HTTPS requests to the localhost IP address 127.0.0.1 bypass the IP address filtering mechanism. While HTTP requests to this address are blocked correctly, HTTPS requests are not, allowing attackers to potentially access internal HTTPS services running on localhost. This bypasses the library's Server-Side Request Forgery (SSRF) protection, especially dangerous when applications accept user-controlled URLs and rely only on network-level restrictions to protect internal services.


How can this vulnerability impact me? :

This vulnerability can allow attackers to access internal HTTPS services running on localhost that are supposed to be protected by IP filtering. If your application accepts user-controlled URLs, attackers could exploit this flaw to bypass SSRF protections and interact with internal services that are not intended to be exposed externally, potentially leading to unauthorized access or information disclosure.


What immediate steps should I take to mitigate this vulnerability?

Upgrade request-filtering-agent to version 2.0.0 or later, as this version contains the fix for the vulnerability that allows HTTPS requests to 127.0.0.1 to bypass IP address filtering.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart