Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11864: Server-Side Request Forgery in NucleoidAI Nucleoid

0
Medium
VulnerabilityCVE-2025-11864cvecve-2025-11864
Published: Thu Oct 16 2025 (10/16/2025, 21:02:05 UTC)
Source: CVE Database V5
Vendor/Project: NucleoidAI
Product: Nucleoid

Description

A vulnerability was identified in NucleoidAI Nucleoid up to 0.7.10. The impacted element is the function extension.apply of the file /src/cluster.ts of the component Outbound Request Handler. Such manipulation of the argument https/ip/port/path/headers leads to server-side request forgery. The attack may be performed from remote.

AI-Powered Analysis

AILast updated: 10/24/2025, 00:49:12 UTC

Technical Analysis

CVE-2025-11864 is a server-side request forgery (SSRF) vulnerability identified in NucleoidAI's Nucleoid software, specifically affecting versions 0.7.0 through 0.7.10. The vulnerability resides in the function extension.apply within the /src/cluster.ts file, part of the Outbound Request Handler component. This function improperly handles the arguments related to https/ip/port/path/headers, allowing an attacker to craft malicious requests that the server will execute. Because the vulnerability can be exploited remotely without authentication or user interaction, an attacker can coerce the vulnerable server to send arbitrary HTTP requests to internal or external systems. This can lead to unauthorized access to internal network resources, bypassing firewall protections, or accessing sensitive data. The CVSS 4.0 base score of 6.9 reflects medium severity, considering the ease of exploitation (network attack vector, no privileges or user interaction required) and the potential impact on confidentiality, integrity, and availability, which are rated as low to medium. No known exploits have been reported in the wild as of the publication date, but the vulnerability presents a significant risk if left unaddressed. The lack of available patches at the time of reporting necessitates immediate mitigation efforts by affected organizations. The vulnerability's exploitation could be a stepping stone for further attacks, such as lateral movement or data exfiltration, especially in complex network environments where Nucleoid is deployed.

Potential Impact

For European organizations, the SSRF vulnerability in Nucleoid poses risks including unauthorized internal network scanning, access to sensitive internal services, and potential data leakage. Organizations relying on Nucleoid for cluster management or orchestration may face disruptions if attackers leverage this flaw to pivot within their networks. Critical sectors such as finance, healthcare, and government, which often deploy advanced cluster management tools, could see increased exposure to espionage or sabotage attempts. The medium severity rating suggests that while immediate catastrophic damage is unlikely, the vulnerability can facilitate more complex attack chains. Additionally, the ability to perform SSRF without authentication increases the attack surface, especially for internet-facing deployments. European entities with strict data protection regulations (e.g., GDPR) must consider the compliance implications of potential data breaches stemming from this vulnerability. The absence of known exploits currently provides a window for proactive defense, but the risk of future exploitation remains significant.

Mitigation Recommendations

1. Apply patches or updates from NucleoidAI as soon as they become available to address CVE-2025-11864 directly. 2. Until patches are released, implement strict outbound network traffic filtering to restrict the server's ability to make arbitrary HTTP requests, limiting destinations to trusted endpoints only. 3. Employ input validation and sanitization on all parameters that influence outbound requests, ensuring that only expected and safe values are accepted. 4. Use network segmentation to isolate systems running Nucleoid from sensitive internal resources, reducing the impact of potential SSRF exploitation. 5. Monitor network logs and outbound traffic for unusual or unexpected requests originating from Nucleoid servers. 6. Consider deploying Web Application Firewalls (WAFs) or Intrusion Detection Systems (IDS) with rules tailored to detect SSRF patterns. 7. Conduct regular security assessments and penetration testing focused on SSRF and related vulnerabilities within the environment. 8. Educate development and operations teams about SSRF risks and secure coding practices to prevent similar issues in future software versions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-16T14:28:29.618Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f160199f8a5dbaea0a238f

Added to database: 10/16/2025, 9:14:01 PM

Last enriched: 10/24/2025, 12:49:12 AM

Last updated: 12/5/2025, 1:53:03 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats