CVE-2025-11864: Server-Side Request Forgery in NucleoidAI Nucleoid
A vulnerability was identified in NucleoidAI Nucleoid up to 0.7.10. The impacted element is the function extension.apply of the file /src/cluster.ts of the component Outbound Request Handler. Such manipulation of the argument https/ip/port/path/headers leads to server-side request forgery. The attack may be performed from remote.
AI Analysis
Technical Summary
CVE-2025-11864 is a server-side request forgery (SSRF) vulnerability identified in NucleoidAI's Nucleoid software, specifically affecting versions 0.7.0 through 0.7.10. The vulnerability resides in the function extension.apply within the /src/cluster.ts file, part of the Outbound Request Handler component. This function improperly handles the arguments related to https/ip/port/path/headers, allowing an attacker to craft malicious requests that the server will execute. Because the vulnerability can be exploited remotely without authentication or user interaction, an attacker can coerce the vulnerable server to send arbitrary HTTP requests to internal or external systems. This can lead to unauthorized access to internal network resources, bypassing firewall protections, or accessing sensitive data. The CVSS 4.0 base score of 6.9 reflects medium severity, considering the ease of exploitation (network attack vector, no privileges or user interaction required) and the potential impact on confidentiality, integrity, and availability, which are rated as low to medium. No known exploits have been reported in the wild as of the publication date, but the vulnerability presents a significant risk if left unaddressed. The lack of available patches at the time of reporting necessitates immediate mitigation efforts by affected organizations. The vulnerability's exploitation could be a stepping stone for further attacks, such as lateral movement or data exfiltration, especially in complex network environments where Nucleoid is deployed.
Potential Impact
For European organizations, the SSRF vulnerability in Nucleoid poses risks including unauthorized internal network scanning, access to sensitive internal services, and potential data leakage. Organizations relying on Nucleoid for cluster management or orchestration may face disruptions if attackers leverage this flaw to pivot within their networks. Critical sectors such as finance, healthcare, and government, which often deploy advanced cluster management tools, could see increased exposure to espionage or sabotage attempts. The medium severity rating suggests that while immediate catastrophic damage is unlikely, the vulnerability can facilitate more complex attack chains. Additionally, the ability to perform SSRF without authentication increases the attack surface, especially for internet-facing deployments. European entities with strict data protection regulations (e.g., GDPR) must consider the compliance implications of potential data breaches stemming from this vulnerability. The absence of known exploits currently provides a window for proactive defense, but the risk of future exploitation remains significant.
Mitigation Recommendations
1. Apply patches or updates from NucleoidAI as soon as they become available to address CVE-2025-11864 directly. 2. Until patches are released, implement strict outbound network traffic filtering to restrict the server's ability to make arbitrary HTTP requests, limiting destinations to trusted endpoints only. 3. Employ input validation and sanitization on all parameters that influence outbound requests, ensuring that only expected and safe values are accepted. 4. Use network segmentation to isolate systems running Nucleoid from sensitive internal resources, reducing the impact of potential SSRF exploitation. 5. Monitor network logs and outbound traffic for unusual or unexpected requests originating from Nucleoid servers. 6. Consider deploying Web Application Firewalls (WAFs) or Intrusion Detection Systems (IDS) with rules tailored to detect SSRF patterns. 7. Conduct regular security assessments and penetration testing focused on SSRF and related vulnerabilities within the environment. 8. Educate development and operations teams about SSRF risks and secure coding practices to prevent similar issues in future software versions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-11864: Server-Side Request Forgery in NucleoidAI Nucleoid
Description
A vulnerability was identified in NucleoidAI Nucleoid up to 0.7.10. The impacted element is the function extension.apply of the file /src/cluster.ts of the component Outbound Request Handler. Such manipulation of the argument https/ip/port/path/headers leads to server-side request forgery. The attack may be performed from remote.
AI-Powered Analysis
Technical Analysis
CVE-2025-11864 is a server-side request forgery (SSRF) vulnerability identified in NucleoidAI's Nucleoid software, specifically affecting versions 0.7.0 through 0.7.10. The vulnerability resides in the function extension.apply within the /src/cluster.ts file, part of the Outbound Request Handler component. This function improperly handles the arguments related to https/ip/port/path/headers, allowing an attacker to craft malicious requests that the server will execute. Because the vulnerability can be exploited remotely without authentication or user interaction, an attacker can coerce the vulnerable server to send arbitrary HTTP requests to internal or external systems. This can lead to unauthorized access to internal network resources, bypassing firewall protections, or accessing sensitive data. The CVSS 4.0 base score of 6.9 reflects medium severity, considering the ease of exploitation (network attack vector, no privileges or user interaction required) and the potential impact on confidentiality, integrity, and availability, which are rated as low to medium. No known exploits have been reported in the wild as of the publication date, but the vulnerability presents a significant risk if left unaddressed. The lack of available patches at the time of reporting necessitates immediate mitigation efforts by affected organizations. The vulnerability's exploitation could be a stepping stone for further attacks, such as lateral movement or data exfiltration, especially in complex network environments where Nucleoid is deployed.
Potential Impact
For European organizations, the SSRF vulnerability in Nucleoid poses risks including unauthorized internal network scanning, access to sensitive internal services, and potential data leakage. Organizations relying on Nucleoid for cluster management or orchestration may face disruptions if attackers leverage this flaw to pivot within their networks. Critical sectors such as finance, healthcare, and government, which often deploy advanced cluster management tools, could see increased exposure to espionage or sabotage attempts. The medium severity rating suggests that while immediate catastrophic damage is unlikely, the vulnerability can facilitate more complex attack chains. Additionally, the ability to perform SSRF without authentication increases the attack surface, especially for internet-facing deployments. European entities with strict data protection regulations (e.g., GDPR) must consider the compliance implications of potential data breaches stemming from this vulnerability. The absence of known exploits currently provides a window for proactive defense, but the risk of future exploitation remains significant.
Mitigation Recommendations
1. Apply patches or updates from NucleoidAI as soon as they become available to address CVE-2025-11864 directly. 2. Until patches are released, implement strict outbound network traffic filtering to restrict the server's ability to make arbitrary HTTP requests, limiting destinations to trusted endpoints only. 3. Employ input validation and sanitization on all parameters that influence outbound requests, ensuring that only expected and safe values are accepted. 4. Use network segmentation to isolate systems running Nucleoid from sensitive internal resources, reducing the impact of potential SSRF exploitation. 5. Monitor network logs and outbound traffic for unusual or unexpected requests originating from Nucleoid servers. 6. Consider deploying Web Application Firewalls (WAFs) or Intrusion Detection Systems (IDS) with rules tailored to detect SSRF patterns. 7. Conduct regular security assessments and penetration testing focused on SSRF and related vulnerabilities within the environment. 8. Educate development and operations teams about SSRF risks and secure coding practices to prevent similar issues in future software versions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-16T14:28:29.618Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f160199f8a5dbaea0a238f
Added to database: 10/16/2025, 9:14:01 PM
Last enriched: 10/24/2025, 12:49:12 AM
Last updated: 12/5/2025, 1:53:03 AM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62223: CWE-451: User Interface (UI) Misrepresentation of Critical Information in Microsoft Microsoft Edge (Chromium-based)
MediumCVE-2025-14052: Improper Access Controls in youlaitech youlai-mall
MediumCVE-2025-13373: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Advantech iView
HighCVE-2025-66564: CWE-405: Asymmetric Resource Consumption (Amplification) in sigstore timestamp-authority
HighCVE-2025-66559: CWE-129: Improper Validation of Array Index in taikoxyz taiko-mono
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.