Skip to main content

CVE-2025-59437: CWE-918 Server-Side Request Forgery (SSRF) in fedorindutny ip

Low
VulnerabilityCVE-2025-59437cvecve-2025-59437cwe-918
Published: Tue Sep 16 2025 (09/16/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: fedorindutny
Product: ip

Description

The ip (aka node-ip) package through 2.0.1 (in NPM) might allow SSRF because the IP address value 0 is improperly categorized as globally routable via isPublic. NOTE: this issue exists because of an incomplete fix for CVE-2024-29415. NOTE: in current versions of several applications, connection attempts to the IP address 0 (interpreted as 0.0.0.0) are blocked with error messages such as net::ERR_ADDRESS_INVALID. However, in some situations that depend on both application version and operating system, connection attempts to 0 and 0.0.0.0 are considered connection attempts to 127.0.0.1 (and, for this reason, a false value of isPublic would be preferable).

AI-Powered Analysis

AILast updated: 09/16/2025, 02:31:21 UTC

Technical Analysis

CVE-2025-59437 is a Server-Side Request Forgery (SSRF) vulnerability identified in the 'ip' package (also known as 'node-ip') maintained by fedorindutny, specifically affecting versions through 2.0.1 available on NPM. The vulnerability arises because the package incorrectly categorizes the IP address value 0 (interpreted as 0.0.0.0) as globally routable via its isPublic function. This misclassification stems from an incomplete fix for a previous vulnerability, CVE-2024-29415. In many environments, connection attempts to 0 or 0.0.0.0 are blocked with errors like net::ERR_ADDRESS_INVALID; however, in certain application versions and operating systems, these attempts are treated as connections to the localhost address 127.0.0.1. This behavior can be exploited by attackers to induce the server to make unintended requests to internal services or localhost endpoints, potentially bypassing network restrictions or firewall rules. The vulnerability does not require user interaction or privileges but has a high attack complexity due to environment-specific behavior. The CVSS v3.1 base score is 3.2, indicating a low severity primarily due to limited impact on confidentiality and availability, with integrity being the main concern. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that mitigation relies on awareness and cautious use of the affected package versions.

Potential Impact

For European organizations, the impact of this SSRF vulnerability depends largely on the deployment of the 'ip' package within their software stacks, particularly in Node.js applications that process or validate IP addresses. Exploitation could allow attackers to perform unauthorized internal network scans or access internal services that are otherwise protected, potentially leading to information disclosure or indirect integrity compromises. While the vulnerability itself is low severity, it could serve as a pivot point in multi-stage attacks targeting internal infrastructure or sensitive services, especially in sectors with critical internal networks such as finance, healthcare, and government. Given the complexity and environment-specific nature of the vulnerability, exploitation may be limited but should not be disregarded. European organizations with Node.js environments that incorporate this package should be vigilant, as internal network architectures and regulatory requirements (e.g., GDPR) heighten the importance of preventing unauthorized internal access.

Mitigation Recommendations

1. Immediate auditing of all Node.js applications and dependencies to identify usage of the 'ip' package (node-ip) versions up to 2.0.1. 2. Where possible, upgrade to a patched or newer version of the package once available from the vendor or maintainers. 3. Implement strict input validation and sanitization for IP address inputs, ensuring that special IP addresses like 0.0.0.0 and localhost are handled securely and not treated as publicly routable. 4. Employ network segmentation and firewall rules to restrict server-side requests from application servers to only necessary internal services, minimizing the attack surface for SSRF. 5. Monitor application logs for unusual outbound requests, especially those targeting localhost or internal IP ranges, to detect potential exploitation attempts. 6. Consider using runtime application self-protection (RASP) or web application firewalls (WAFs) that can detect and block SSRF patterns. 7. Educate development teams about the risks of SSRF and the importance of proper IP address handling in code.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c8c86eee2781683eecc885

Added to database: 9/16/2025, 2:16:14 AM

Last enriched: 9/16/2025, 2:31:21 AM

Last updated: 9/16/2025, 2:31:21 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats