Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66405: CWE-918: Server-Side Request Forgery (SSRF) in Portkey-AI gateway

0
Medium
VulnerabilityCVE-2025-66405cvecve-2025-66405cwe-918
Published: Mon Dec 01 2025 (12/01/2025, 22:25:36 UTC)
Source: CVE Database V5
Vendor/Project: Portkey-AI
Product: gateway

Description

Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.

AI-Powered Analysis

AILast updated: 12/01/2025, 22:54:48 UTC

Technical Analysis

CVE-2025-66405 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Portkey-AI Gateway product, specifically affecting versions prior to 1.14.0. The vulnerability arises because the gateway determines the destination baseURL for proxy requests by prioritizing the value supplied in the x-portkey-custom-host HTTP header. This design flaw allows an attacker to manipulate this header to direct the gateway to send requests to arbitrary internal or external network endpoints. The proxy route appends the client-specified path to the baseURL and performs an external fetch, which can be exploited to access internal services that are otherwise inaccessible externally, potentially leading to information disclosure or further network exploitation. The vulnerability does not require any authentication or user interaction, making it easier to exploit remotely. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and no impact on confidentiality, integrity, or availability (VC:N/VI:N/VA:N), but with scope impact (S: I), which suggests that the vulnerability affects components beyond the initially vulnerable component. The vulnerability was published on December 1, 2025, and has a medium severity rating with a CVSS score of 6.9. The issue is resolved in Portkey-AI Gateway version 1.14.0, which no longer prioritizes the x-portkey-custom-host header for determining the destination baseURL, thereby preventing SSRF exploitation.

Potential Impact

For European organizations, the SSRF vulnerability in Portkey-AI Gateway could allow attackers to pivot from the exposed gateway to internal network resources, potentially accessing sensitive data, internal APIs, or cloud metadata services. This could lead to unauthorized data disclosure, reconnaissance of internal infrastructure, or facilitate further attacks such as privilege escalation or lateral movement within the network. Organizations relying on Portkey-AI Gateway as a proxy for AI-related services or integrations may face disruptions or data breaches if exploited. Given that no authentication or user interaction is required, the attack surface is broad, increasing the risk of automated exploitation attempts. The impact is particularly significant for sectors with sensitive internal networks such as finance, healthcare, and critical infrastructure providers prevalent in Europe. Additionally, the ability to manipulate internal requests could undermine trust in AI service integrations and complicate compliance with data protection regulations like GDPR if internal data is exposed.

Mitigation Recommendations

European organizations should immediately upgrade Portkey-AI Gateway to version 1.14.0 or later to apply the official fix that removes reliance on the x-portkey-custom-host header for baseURL determination. Until the upgrade is applied, organizations should implement strict network segmentation to restrict the gateway's ability to reach sensitive internal services. Deploying Web Application Firewalls (WAFs) with rules to detect and block suspicious header manipulations or unusual outbound requests from the gateway can help mitigate exploitation attempts. Monitoring and logging of all proxy requests, especially those containing the x-portkey-custom-host header, should be enabled to detect potential abuse. Additionally, organizations should review and restrict the gateway's outbound network permissions to only trusted destinations. Conducting internal penetration tests focusing on SSRF scenarios can help identify residual risks. Finally, educating developers and administrators about the risks of trusting client-supplied headers in proxy configurations will help prevent similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-28T23:33:56.365Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692e19186dbd3477d74d63cf

Added to database: 12/1/2025, 10:39:20 PM

Last enriched: 12/1/2025, 10:54:48 PM

Last updated: 12/4/2025, 1:55:50 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats