CVE-2025-64752: CWE-918: Server-Side Request Forgery (SSRF) in gristlabs grist-core
grist-core is a spreadsheet hosting server. Prior to version 1.7.7, a user with access to any document on a Grist installation can use a feature for fetching from a URL that is executed on the server. The privileged network access of server-side requests could offer opportunities for attack escalation. This issue is fixed in version 1.7.7. The mitigation was to use the proxy for untrusted fetches intended for such purposes. As a workaround, avoid making http/https endpoints available to an instance running Grist that expose credentials or operate without credentials.
AI Analysis
Technical Summary
CVE-2025-64752 is a Server-Side Request Forgery (SSRF) vulnerability identified in gristlabs' grist-core, a spreadsheet hosting server. The vulnerability exists in versions prior to 1.7.7 and arises from a feature that allows users with access to any document on a Grist installation to fetch data from arbitrary URLs. These fetch requests are executed on the server side, which typically has privileged network access, including access to internal networks and services not exposed externally. An attacker exploiting this SSRF can coerce the server into making unauthorized requests to internal or external systems, potentially leading to information disclosure or further attack escalation within the network. The vulnerability does not require any privileges or user interaction, increasing its risk profile. The flaw was addressed in version 1.7.7 by implementing a proxy mechanism for untrusted fetches, effectively isolating and controlling outbound requests. As a workaround, administrators are advised to avoid exposing HTTP/HTTPS endpoints that handle sensitive credentials or operate without authentication to the Grist instance. The CVSS v3.1 score of 6.8 reflects a medium severity, with a network attack vector, high confidentiality impact, no integrity or availability impact, and no privileges or user interaction required. No known exploits have been reported in the wild as of the publication date.
Potential Impact
For European organizations using grist-core versions prior to 1.7.7, this SSRF vulnerability poses a significant risk of unauthorized internal network access and data exposure. Attackers could leverage the server's privileged network position to access internal services, potentially bypassing perimeter defenses. This could lead to disclosure of sensitive information such as internal APIs, databases, or cloud metadata services, which may contain credentials or configuration data. Although the vulnerability does not directly impact data integrity or availability, the confidentiality breach could facilitate further attacks, including lateral movement or privilege escalation within the affected environment. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and government, may face regulatory and reputational consequences if sensitive data is exposed. The medium severity score suggests a moderate but non-negligible risk, especially in environments where grist-core is integrated with critical internal systems or where network segmentation is weak.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately upgrade grist-core installations to version 1.7.7 or later, where the SSRF issue is fixed by routing untrusted fetches through a proxy. Until upgrades can be performed, administrators should restrict the Grist server's network access by implementing strict egress filtering and firewall rules to limit outbound HTTP/HTTPS requests only to trusted destinations. Additionally, avoid exposing HTTP/HTTPS endpoints that handle sensitive credentials or operate without authentication to the Grist instance. Network segmentation should be enforced to isolate the Grist server from critical internal services. Monitoring and logging of outbound requests from the Grist server should be enhanced to detect anomalous or unauthorized fetch attempts. Finally, review and audit user permissions to ensure that only trusted users have document access, reducing the attack surface for SSRF exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium
CVE-2025-64752: CWE-918: Server-Side Request Forgery (SSRF) in gristlabs grist-core
Description
grist-core is a spreadsheet hosting server. Prior to version 1.7.7, a user with access to any document on a Grist installation can use a feature for fetching from a URL that is executed on the server. The privileged network access of server-side requests could offer opportunities for attack escalation. This issue is fixed in version 1.7.7. The mitigation was to use the proxy for untrusted fetches intended for such purposes. As a workaround, avoid making http/https endpoints available to an instance running Grist that expose credentials or operate without credentials.
AI-Powered Analysis
Technical Analysis
CVE-2025-64752 is a Server-Side Request Forgery (SSRF) vulnerability identified in gristlabs' grist-core, a spreadsheet hosting server. The vulnerability exists in versions prior to 1.7.7 and arises from a feature that allows users with access to any document on a Grist installation to fetch data from arbitrary URLs. These fetch requests are executed on the server side, which typically has privileged network access, including access to internal networks and services not exposed externally. An attacker exploiting this SSRF can coerce the server into making unauthorized requests to internal or external systems, potentially leading to information disclosure or further attack escalation within the network. The vulnerability does not require any privileges or user interaction, increasing its risk profile. The flaw was addressed in version 1.7.7 by implementing a proxy mechanism for untrusted fetches, effectively isolating and controlling outbound requests. As a workaround, administrators are advised to avoid exposing HTTP/HTTPS endpoints that handle sensitive credentials or operate without authentication to the Grist instance. The CVSS v3.1 score of 6.8 reflects a medium severity, with a network attack vector, high confidentiality impact, no integrity or availability impact, and no privileges or user interaction required. No known exploits have been reported in the wild as of the publication date.
Potential Impact
For European organizations using grist-core versions prior to 1.7.7, this SSRF vulnerability poses a significant risk of unauthorized internal network access and data exposure. Attackers could leverage the server's privileged network position to access internal services, potentially bypassing perimeter defenses. This could lead to disclosure of sensitive information such as internal APIs, databases, or cloud metadata services, which may contain credentials or configuration data. Although the vulnerability does not directly impact data integrity or availability, the confidentiality breach could facilitate further attacks, including lateral movement or privilege escalation within the affected environment. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and government, may face regulatory and reputational consequences if sensitive data is exposed. The medium severity score suggests a moderate but non-negligible risk, especially in environments where grist-core is integrated with critical internal systems or where network segmentation is weak.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately upgrade grist-core installations to version 1.7.7 or later, where the SSRF issue is fixed by routing untrusted fetches through a proxy. Until upgrades can be performed, administrators should restrict the Grist server's network access by implementing strict egress filtering and firewall rules to limit outbound HTTP/HTTPS requests only to trusted destinations. Additionally, avoid exposing HTTP/HTTPS endpoints that handle sensitive credentials or operate without authentication to the Grist instance. Network segmentation should be enforced to isolate the Grist server from critical internal services. Monitoring and logging of outbound requests from the Grist server should be enhanced to detect anomalous or unauthorized fetch attempts. Finally, review and audit user permissions to ensure that only trusted users have document access, reducing the attack surface for SSRF exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-10T22:29:34.873Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6916529405b975ba759276fa
Added to database: 11/13/2025, 9:50:12 PM
Last enriched: 11/20/2025, 11:13:18 PM
Last updated: 12/29/2025, 10:31:01 AM
Views: 88
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15183: SQL Injection in code-projects Refugee Food Management System
MediumCVE-2025-15182: SQL Injection in code-projects Refugee Food Management System
MediumHacker Claims Theft of 40 Million Condé Nast Records After Wired Data Leak
MediumCVE-2025-15181: SQL Injection in code-projects Refugee Food Management System
MediumCVE-2025-15180: Stack-based Buffer Overflow in Tenda WH450
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.