CVE-2025-9799: Server-Side Request Forgery in Langfuse
A security flaw has been discovered in Langfuse up to 3.88.0. Affected by this vulnerability is the function promptChangeEventSourcing of the file web/src/features/prompts/server/routers/promptRouter.ts of the component Webhook Handler. Performing manipulation results in server-side request forgery. The attack may be initiated remotely. A high degree of complexity is needed for the attack. The exploitation appears to be difficult. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-9799 is a Server-Side Request Forgery (SSRF) vulnerability identified in Langfuse versions up to 3.88.0, specifically within the function promptChangeEventSourcing located in the file web/src/features/prompts/server/routers/promptRouter.ts, part of the Webhook Handler component. SSRF vulnerabilities allow an attacker to induce the server-side application to make HTTP requests to arbitrary domains or internal systems that the attacker would not normally have access to. In this case, the vulnerability arises from insufficient validation or sanitization of user-controlled input that is processed by the promptChangeEventSourcing function, enabling manipulation of server requests. The attack can be initiated remotely, but it requires a high degree of complexity and is considered difficult to exploit. The CVSS 4.0 score is 2.3, indicating low severity, reflecting limited impact and high attack complexity. The vulnerability does not require user interaction and has low impact on confidentiality, integrity, and availability, with no privileges required beyond low privileges. Although the exploit code has been publicly released, there are no known widespread exploits in the wild at this time. The vulnerability affects a broad range of Langfuse versions from 3.0 through 3.88.0, indicating that many deployments could be vulnerable if not patched or mitigated. The lack of available patches at the time of publication suggests that organizations must implement compensating controls to reduce risk until an official fix is released.
Potential Impact
For European organizations using Langfuse, this SSRF vulnerability could allow attackers to leverage the affected server to send unauthorized requests to internal or external systems. Potential impacts include unauthorized access to internal services, data leakage, or use of the server as a proxy to bypass network restrictions. However, due to the high complexity and difficulty of exploitation, as well as the low CVSS score, the immediate risk is limited. Organizations with sensitive internal services accessible only from the Langfuse server could face increased risk if attackers successfully exploit this flaw. Additionally, if Langfuse is integrated into critical workflows or handles sensitive data, even limited SSRF exploitation could lead to information disclosure or indirect compromise. The public availability of exploit code increases the urgency for European organizations to assess and mitigate this vulnerability, especially those in sectors with stringent data protection requirements such as finance, healthcare, and government.
Mitigation Recommendations
1. Immediate mitigation should include restricting outbound network access from Langfuse servers to only trusted destinations using firewall rules or network segmentation to limit the potential impact of SSRF exploitation. 2. Implement strict input validation and sanitization on all user-controlled inputs processed by the promptChangeEventSourcing function or related webhook handlers to prevent malicious payloads. 3. Monitor logs for unusual outbound requests originating from Langfuse servers that could indicate attempted exploitation. 4. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block SSRF attack patterns targeting the vulnerable endpoints. 5. Coordinate with Langfuse vendors or maintainers to obtain and apply patches as soon as they become available. 6. Conduct security reviews and penetration testing focused on SSRF vectors within Langfuse integrations. 7. Educate development and security teams about SSRF risks and secure coding practices to prevent similar vulnerabilities in future releases.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2025-9799: Server-Side Request Forgery in Langfuse
Description
A security flaw has been discovered in Langfuse up to 3.88.0. Affected by this vulnerability is the function promptChangeEventSourcing of the file web/src/features/prompts/server/routers/promptRouter.ts of the component Webhook Handler. Performing manipulation results in server-side request forgery. The attack may be initiated remotely. A high degree of complexity is needed for the attack. The exploitation appears to be difficult. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-9799 is a Server-Side Request Forgery (SSRF) vulnerability identified in Langfuse versions up to 3.88.0, specifically within the function promptChangeEventSourcing located in the file web/src/features/prompts/server/routers/promptRouter.ts, part of the Webhook Handler component. SSRF vulnerabilities allow an attacker to induce the server-side application to make HTTP requests to arbitrary domains or internal systems that the attacker would not normally have access to. In this case, the vulnerability arises from insufficient validation or sanitization of user-controlled input that is processed by the promptChangeEventSourcing function, enabling manipulation of server requests. The attack can be initiated remotely, but it requires a high degree of complexity and is considered difficult to exploit. The CVSS 4.0 score is 2.3, indicating low severity, reflecting limited impact and high attack complexity. The vulnerability does not require user interaction and has low impact on confidentiality, integrity, and availability, with no privileges required beyond low privileges. Although the exploit code has been publicly released, there are no known widespread exploits in the wild at this time. The vulnerability affects a broad range of Langfuse versions from 3.0 through 3.88.0, indicating that many deployments could be vulnerable if not patched or mitigated. The lack of available patches at the time of publication suggests that organizations must implement compensating controls to reduce risk until an official fix is released.
Potential Impact
For European organizations using Langfuse, this SSRF vulnerability could allow attackers to leverage the affected server to send unauthorized requests to internal or external systems. Potential impacts include unauthorized access to internal services, data leakage, or use of the server as a proxy to bypass network restrictions. However, due to the high complexity and difficulty of exploitation, as well as the low CVSS score, the immediate risk is limited. Organizations with sensitive internal services accessible only from the Langfuse server could face increased risk if attackers successfully exploit this flaw. Additionally, if Langfuse is integrated into critical workflows or handles sensitive data, even limited SSRF exploitation could lead to information disclosure or indirect compromise. The public availability of exploit code increases the urgency for European organizations to assess and mitigate this vulnerability, especially those in sectors with stringent data protection requirements such as finance, healthcare, and government.
Mitigation Recommendations
1. Immediate mitigation should include restricting outbound network access from Langfuse servers to only trusted destinations using firewall rules or network segmentation to limit the potential impact of SSRF exploitation. 2. Implement strict input validation and sanitization on all user-controlled inputs processed by the promptChangeEventSourcing function or related webhook handlers to prevent malicious payloads. 3. Monitor logs for unusual outbound requests originating from Langfuse servers that could indicate attempted exploitation. 4. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block SSRF attack patterns targeting the vulnerable endpoints. 5. Coordinate with Langfuse vendors or maintainers to obtain and apply patches as soon as they become available. 6. Conduct security reviews and penetration testing focused on SSRF vectors within Langfuse integrations. 7. Educate development and security teams about SSRF risks and secure coding practices to prevent similar vulnerabilities in future releases.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-01T12:23:02.536Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b61b86ad5a09ad00d4543f
Added to database: 9/1/2025, 10:17:42 PM
Last enriched: 9/1/2025, 10:32:48 PM
Last updated: 10/16/2025, 4:51:10 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11814: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Brainstorm Force Ultimate Addons for WPBakery
MediumCVE-2025-62580: CWE-121 Stack-based Buffer Overflow in Delta Electronics ASDA-Soft
HighCVE-2025-62579: CWE-121 Stack-based Buffer Overflow in Delta Electronics ASDA-Soft
HighCVE-2025-10700: CWE-352 Cross-Site Request Forgery (CSRF) in elemntor Ally – Web Accessibility & Usability
MediumCVE-2025-11683: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in TODDR YAML::Syck
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.