CVE-2025-9799: Server-Side Request Forgery in Langfuse
A security flaw has been discovered in Langfuse up to 3.88.0. Affected by this vulnerability is the function promptChangeEventSourcing of the file web/src/features/prompts/server/routers/promptRouter.ts of the component Webhook Handler. Performing manipulation results in server-side request forgery. The attack may be initiated remotely. A high degree of complexity is needed for the attack. The exploitation appears to be difficult. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-9799 is a Server-Side Request Forgery (SSRF) vulnerability identified in Langfuse versions up to 3.88.0, specifically within the function promptChangeEventSourcing located in the file web/src/features/prompts/server/routers/promptRouter.ts, part of the Webhook Handler component. SSRF vulnerabilities allow an attacker to induce the server-side application to make HTTP requests to arbitrary domains or internal systems that the attacker would not normally have access to. In this case, the vulnerability arises from insufficient validation or sanitization of user-controlled input that is processed by the promptChangeEventSourcing function, enabling manipulation of server requests. The attack can be initiated remotely, but it requires a high degree of complexity and is considered difficult to exploit. The CVSS 4.0 score is 2.3, indicating low severity, reflecting limited impact and high attack complexity. The vulnerability does not require user interaction and has low impact on confidentiality, integrity, and availability, with no privileges required beyond low privileges. Although the exploit code has been publicly released, there are no known widespread exploits in the wild at this time. The vulnerability affects a broad range of Langfuse versions from 3.0 through 3.88.0, indicating that many deployments could be vulnerable if not patched or mitigated. The lack of available patches at the time of publication suggests that organizations must implement compensating controls to reduce risk until an official fix is released.
Potential Impact
For European organizations using Langfuse, this SSRF vulnerability could allow attackers to leverage the affected server to send unauthorized requests to internal or external systems. Potential impacts include unauthorized access to internal services, data leakage, or use of the server as a proxy to bypass network restrictions. However, due to the high complexity and difficulty of exploitation, as well as the low CVSS score, the immediate risk is limited. Organizations with sensitive internal services accessible only from the Langfuse server could face increased risk if attackers successfully exploit this flaw. Additionally, if Langfuse is integrated into critical workflows or handles sensitive data, even limited SSRF exploitation could lead to information disclosure or indirect compromise. The public availability of exploit code increases the urgency for European organizations to assess and mitigate this vulnerability, especially those in sectors with stringent data protection requirements such as finance, healthcare, and government.
Mitigation Recommendations
1. Immediate mitigation should include restricting outbound network access from Langfuse servers to only trusted destinations using firewall rules or network segmentation to limit the potential impact of SSRF exploitation. 2. Implement strict input validation and sanitization on all user-controlled inputs processed by the promptChangeEventSourcing function or related webhook handlers to prevent malicious payloads. 3. Monitor logs for unusual outbound requests originating from Langfuse servers that could indicate attempted exploitation. 4. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block SSRF attack patterns targeting the vulnerable endpoints. 5. Coordinate with Langfuse vendors or maintainers to obtain and apply patches as soon as they become available. 6. Conduct security reviews and penetration testing focused on SSRF vectors within Langfuse integrations. 7. Educate development and security teams about SSRF risks and secure coding practices to prevent similar vulnerabilities in future releases.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2025-9799: Server-Side Request Forgery in Langfuse
Description
A security flaw has been discovered in Langfuse up to 3.88.0. Affected by this vulnerability is the function promptChangeEventSourcing of the file web/src/features/prompts/server/routers/promptRouter.ts of the component Webhook Handler. Performing manipulation results in server-side request forgery. The attack may be initiated remotely. A high degree of complexity is needed for the attack. The exploitation appears to be difficult. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-9799 is a Server-Side Request Forgery (SSRF) vulnerability identified in Langfuse versions up to 3.88.0, specifically within the function promptChangeEventSourcing located in the file web/src/features/prompts/server/routers/promptRouter.ts, part of the Webhook Handler component. SSRF vulnerabilities allow an attacker to induce the server-side application to make HTTP requests to arbitrary domains or internal systems that the attacker would not normally have access to. In this case, the vulnerability arises from insufficient validation or sanitization of user-controlled input that is processed by the promptChangeEventSourcing function, enabling manipulation of server requests. The attack can be initiated remotely, but it requires a high degree of complexity and is considered difficult to exploit. The CVSS 4.0 score is 2.3, indicating low severity, reflecting limited impact and high attack complexity. The vulnerability does not require user interaction and has low impact on confidentiality, integrity, and availability, with no privileges required beyond low privileges. Although the exploit code has been publicly released, there are no known widespread exploits in the wild at this time. The vulnerability affects a broad range of Langfuse versions from 3.0 through 3.88.0, indicating that many deployments could be vulnerable if not patched or mitigated. The lack of available patches at the time of publication suggests that organizations must implement compensating controls to reduce risk until an official fix is released.
Potential Impact
For European organizations using Langfuse, this SSRF vulnerability could allow attackers to leverage the affected server to send unauthorized requests to internal or external systems. Potential impacts include unauthorized access to internal services, data leakage, or use of the server as a proxy to bypass network restrictions. However, due to the high complexity and difficulty of exploitation, as well as the low CVSS score, the immediate risk is limited. Organizations with sensitive internal services accessible only from the Langfuse server could face increased risk if attackers successfully exploit this flaw. Additionally, if Langfuse is integrated into critical workflows or handles sensitive data, even limited SSRF exploitation could lead to information disclosure or indirect compromise. The public availability of exploit code increases the urgency for European organizations to assess and mitigate this vulnerability, especially those in sectors with stringent data protection requirements such as finance, healthcare, and government.
Mitigation Recommendations
1. Immediate mitigation should include restricting outbound network access from Langfuse servers to only trusted destinations using firewall rules or network segmentation to limit the potential impact of SSRF exploitation. 2. Implement strict input validation and sanitization on all user-controlled inputs processed by the promptChangeEventSourcing function or related webhook handlers to prevent malicious payloads. 3. Monitor logs for unusual outbound requests originating from Langfuse servers that could indicate attempted exploitation. 4. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block SSRF attack patterns targeting the vulnerable endpoints. 5. Coordinate with Langfuse vendors or maintainers to obtain and apply patches as soon as they become available. 6. Conduct security reviews and penetration testing focused on SSRF vectors within Langfuse integrations. 7. Educate development and security teams about SSRF risks and secure coding practices to prevent similar vulnerabilities in future releases.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-01T12:23:02.536Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b61b86ad5a09ad00d4543f
Added to database: 9/1/2025, 10:17:42 PM
Last enriched: 9/1/2025, 10:32:48 PM
Last updated: 9/3/2025, 5:15:54 AM
Views: 7
Related Threats
CVE-2025-1740: CWE-307 Improper Restriction of Excessive Authentication Attempts in Akinsoft MyRezzta
CriticalCVE-2025-2415: CWE-307 Improper Restriction of Excessive Authentication Attempts in Akinsoft MyRezzta
HighCVE-2025-9219: CWE-862 Missing Authorization in saadiqbal Post SMTP – WP SMTP Plugin with Email Logs and Mobile App for Failure Notifications – Gmail SMTP, Office 365, Brevo, Mailgun, Amazon SES and more
MediumCVE-2025-9817: CWE-476: NULL Pointer Dereference in Wireshark Foundation Wireshark
HighCVE-2025-8663: CWE-532 Insertion of Sensitive Information into Log File in upKeeper Solutions upKeeper Manager
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.