Skip to main content

CVE-2025-57814: CWE-918: Server-Side Request Forgery (SSRF) in azu request-filtering-agent

Medium
VulnerabilityCVE-2025-57814cvecve-2025-57814cwe-918
Published: Mon Aug 25 2025 (08/25/2025, 21:48:09 UTC)
Source: CVE Database V5
Vendor/Project: azu
Product: request-filtering-agent

Description

request-filtering-agent is an http(s).Agent implementation that blocks requests to Private/Reserved IP addresses. Versions 1.x.x and earlier contain a vulnerability where HTTPS requests to 127.0.0.1 bypass IP address filtering, while HTTP requests are correctly blocked. This allows attackers to potentially access internal HTTPS services running on localhost, bypassing the library's SSRF protection. The vulnerability is particularly dangerous when the application accepts user-controlled URLs and internal services are only protected by network-level restrictions. This vulnerability has been fixed in request-filtering-agent version 2.0.0. Users should upgrade to version 2.0.0 or later.

AI-Powered Analysis

AILast updated: 08/25/2025, 22:17:59 UTC

Technical Analysis

CVE-2025-57814 is a Server-Side Request Forgery (SSRF) vulnerability identified in the azu project’s request-filtering-agent, an HTTP(S) agent implementation designed to block requests to private or reserved IP addresses. The vulnerability affects all versions prior to 2.0.0. The core issue lies in the agent's handling of HTTPS requests to the localhost IP address 127.0.0.1. While HTTP requests to this address are correctly blocked, HTTPS requests bypass the IP filtering mechanism, allowing an attacker to send crafted HTTPS requests to internal services running on localhost. This bypass undermines the intended SSRF protection, which is critical when applications accept user-controlled URLs and rely solely on network-level restrictions to protect internal services. Exploiting this vulnerability could enable attackers to access sensitive internal endpoints, potentially exposing confidential data or enabling further internal attacks. The vulnerability has a CVSS 4.0 base score of 5.5 (medium severity), reflecting its network attack vector, low attack complexity, no required privileges or user interaction, and limited scope impact. The issue was publicly disclosed on August 25, 2025, and fixed in version 2.0.0 of the request-filtering-agent. No known exploits are currently reported in the wild.

Potential Impact

For European organizations, this vulnerability poses a moderate risk, particularly for those using the azu request-filtering-agent in their web applications or microservices architectures. Organizations that accept user-supplied URLs and rely on this library for SSRF protection may inadvertently expose internal HTTPS services running on localhost. This can lead to unauthorized access to sensitive internal APIs, configuration endpoints, or administrative interfaces that are otherwise protected by network segmentation. The impact includes potential data leakage, unauthorized internal reconnaissance, and a stepping stone for further lateral movement or privilege escalation within the network. Given the medium CVSS score and the lack of required authentication or user interaction, exploitation could be automated and executed remotely, increasing the risk for cloud-based and internet-facing applications. However, the absence of known active exploits and the availability of a patch reduce immediate risk if organizations promptly update.

Mitigation Recommendations

European organizations should immediately upgrade the azu request-filtering-agent to version 2.0.0 or later, where the HTTPS localhost filtering bypass is fixed. Beyond patching, organizations should implement strict input validation and sanitization for any user-controlled URLs to limit SSRF attack vectors. Employing network segmentation and zero-trust principles to restrict access to internal services, even from localhost, can reduce the impact of potential SSRF attacks. Monitoring and logging outbound HTTP(S) requests from applications can help detect anomalous internal requests indicative of exploitation attempts. Additionally, organizations should conduct security reviews of all third-party libraries used in their software stack to identify similar SSRF protections and ensure they are up to date. Finally, applying runtime application self-protection (RASP) or web application firewalls (WAFs) with SSRF detection capabilities can provide an additional layer of defense.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-20T14:30:35.010Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68acdd84ad5a09ad00509dca

Added to database: 8/25/2025, 10:02:44 PM

Last enriched: 8/25/2025, 10:17:59 PM

Last updated: 8/25/2025, 10:17:59 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats