CVE-2025-67647: CWE-248: Uncaught Exception in sveltejs kit
SvelteKit is a framework for rapidly developing robust, performant web applications using Svelte. Prior to 2.49.5, SvelteKit is vulnerable to a server side request forgery (SSRF) and denial of service (DoS) under certain conditions. From 2.44.0 through 2.49.4, the vulnerability results in a DoS when your app has at least one prerendered route (export const prerender = true). From 2.19.0 through 2.49.4, the vulnerability results in a DoS when your app has at least one prerendered route and you are using adapter-node without a configured ORIGIN environment variable, and you are not using a reverse proxy that implements Host header validation. This vulnerability is fixed in 2.49.5.
AI Analysis
Technical Summary
CVE-2025-67647 is a vulnerability in the SvelteKit web application framework affecting versions from 2.19.0 through 2.49.4. The flaw is rooted in uncaught exceptions leading to server-side request forgery (SSRF) and denial of service (DoS) conditions when applications have at least one prerendered route (export const prerender = true). Specifically, when using the adapter-node deployment without a configured ORIGIN environment variable and lacking a reverse proxy that validates the Host header, attackers can exploit this to cause DoS or SSRF. SSRF allows attackers to make unauthorized requests from the server to internal or external systems, potentially bypassing firewall restrictions, while DoS can disrupt service availability by crashing or exhausting server resources. The vulnerability does not require authentication or user interaction and can be triggered remotely, increasing its risk profile. The issue is tracked under CWE-248 (Uncaught Exception) and CWE-918 (Server-Side Request Forgery). The vulnerability was publicly disclosed in January 2026 and fixed in SvelteKit version 2.49.5. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality and availability, with partial impact on integrity. No known exploits are currently reported in the wild, but the high severity and ease of exploitation warrant immediate attention.
Potential Impact
For European organizations, this vulnerability poses significant risks to web applications built with affected SvelteKit versions. The SSRF aspect can be leveraged to access internal network resources, potentially exposing sensitive data or enabling lateral movement within corporate networks. The DoS component can disrupt critical web services, causing downtime and impacting business continuity. Organizations relying on prerendered routes and adapter-node deployments without proper environment configuration or reverse proxy protections are particularly vulnerable. This can affect sectors with high web application usage such as finance, e-commerce, government, and technology. The ease of remote exploitation without authentication increases the likelihood of automated attacks and scanning by threat actors. Additionally, SSRF can be a stepping stone for more complex attacks, including data exfiltration or pivoting to internal systems. The vulnerability may also impact compliance with European data protection regulations if it leads to unauthorized data access or service disruptions.
Mitigation Recommendations
The primary mitigation is to upgrade all SvelteKit instances to version 2.49.5 or later, where the vulnerability is patched. For organizations unable to immediately upgrade, it is critical to configure the ORIGIN environment variable correctly when using adapter-node to ensure proper request origin validation. Deploying a reverse proxy that performs strict Host header validation can prevent exploitation by blocking malicious requests that attempt to exploit the SSRF vector. Additionally, implement network segmentation and firewall rules to limit the server's ability to make arbitrary outbound requests, reducing SSRF impact. Monitoring application logs for unusual request patterns targeting prerendered routes can help detect exploitation attempts. Conduct thorough code reviews to ensure no other uncaught exceptions or SSRF vectors exist. Finally, maintain an incident response plan to quickly address any detected exploitation attempts or service disruptions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-67647: CWE-248: Uncaught Exception in sveltejs kit
Description
SvelteKit is a framework for rapidly developing robust, performant web applications using Svelte. Prior to 2.49.5, SvelteKit is vulnerable to a server side request forgery (SSRF) and denial of service (DoS) under certain conditions. From 2.44.0 through 2.49.4, the vulnerability results in a DoS when your app has at least one prerendered route (export const prerender = true). From 2.19.0 through 2.49.4, the vulnerability results in a DoS when your app has at least one prerendered route and you are using adapter-node without a configured ORIGIN environment variable, and you are not using a reverse proxy that implements Host header validation. This vulnerability is fixed in 2.49.5.
AI-Powered Analysis
Technical Analysis
CVE-2025-67647 is a vulnerability in the SvelteKit web application framework affecting versions from 2.19.0 through 2.49.4. The flaw is rooted in uncaught exceptions leading to server-side request forgery (SSRF) and denial of service (DoS) conditions when applications have at least one prerendered route (export const prerender = true). Specifically, when using the adapter-node deployment without a configured ORIGIN environment variable and lacking a reverse proxy that validates the Host header, attackers can exploit this to cause DoS or SSRF. SSRF allows attackers to make unauthorized requests from the server to internal or external systems, potentially bypassing firewall restrictions, while DoS can disrupt service availability by crashing or exhausting server resources. The vulnerability does not require authentication or user interaction and can be triggered remotely, increasing its risk profile. The issue is tracked under CWE-248 (Uncaught Exception) and CWE-918 (Server-Side Request Forgery). The vulnerability was publicly disclosed in January 2026 and fixed in SvelteKit version 2.49.5. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality and availability, with partial impact on integrity. No known exploits are currently reported in the wild, but the high severity and ease of exploitation warrant immediate attention.
Potential Impact
For European organizations, this vulnerability poses significant risks to web applications built with affected SvelteKit versions. The SSRF aspect can be leveraged to access internal network resources, potentially exposing sensitive data or enabling lateral movement within corporate networks. The DoS component can disrupt critical web services, causing downtime and impacting business continuity. Organizations relying on prerendered routes and adapter-node deployments without proper environment configuration or reverse proxy protections are particularly vulnerable. This can affect sectors with high web application usage such as finance, e-commerce, government, and technology. The ease of remote exploitation without authentication increases the likelihood of automated attacks and scanning by threat actors. Additionally, SSRF can be a stepping stone for more complex attacks, including data exfiltration or pivoting to internal systems. The vulnerability may also impact compliance with European data protection regulations if it leads to unauthorized data access or service disruptions.
Mitigation Recommendations
The primary mitigation is to upgrade all SvelteKit instances to version 2.49.5 or later, where the vulnerability is patched. For organizations unable to immediately upgrade, it is critical to configure the ORIGIN environment variable correctly when using adapter-node to ensure proper request origin validation. Deploying a reverse proxy that performs strict Host header validation can prevent exploitation by blocking malicious requests that attempt to exploit the SSRF vector. Additionally, implement network segmentation and firewall rules to limit the server's ability to make arbitrary outbound requests, reducing SSRF impact. Monitoring application logs for unusual request patterns targeting prerendered routes can help detect exploitation attempts. Conduct thorough code reviews to ensure no other uncaught exceptions or SSRF vectors exist. Finally, maintain an incident response plan to quickly address any detected exploitation attempts or service disruptions.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-09T18:36:41.331Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6969342c53752d4047cfdaf0
Added to database: 1/15/2026, 6:38:36 PM
Last enriched: 1/15/2026, 6:52:57 PM
Last updated: 1/15/2026, 8:27:45 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65349: n/a
UnknownCVE-2026-23519: CWE-208: Observable Timing Discrepancy in RustCrypto utils
HighCVE-2024-48077: n/a
HighCVE-2026-23622: CWE-352: Cross-Site Request Forgery (CSRF) in alextselegidis easyappointments
HighCVE-2026-23527: CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') in h3js h3
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.