CVE-2026-27730: CWE-918: Server-Side Request Forgery (SSRF) in esm-dev esm.sh
esm.sh is a no-build content delivery network (CDN) for web development. Versions up to and including 137 have an SSRF vulnerability (CWE-918) in esm.sh’s `/http(s)` fetch route. The service tries to block localhost/internal targets, but the validation is based on hostname string checks and can be bypassed using DNS alias domains. This allows an external requester to make the esm.sh server fetch internal localhost services. As of time of publication, no known patched versions exist.
AI Analysis
Technical Summary
esm.sh is a no-build CDN service widely used in web development to serve JavaScript modules without requiring local builds. Versions up to and including 137 contain a Server-Side Request Forgery (SSRF) vulnerability identified as CVE-2026-27730 (CWE-918). The vulnerability resides in the /http(s) fetch route, which allows external users to request esm.sh to fetch arbitrary URLs. To prevent abuse, esm.sh attempts to block requests targeting localhost or internal network addresses by performing hostname string checks. However, this validation is insufficient and can be bypassed by using DNS alias domains that resolve to internal IP addresses, effectively tricking the service into fetching internal resources. This can lead to unauthorized access to internal services that are otherwise inaccessible externally, potentially exposing sensitive data or internal APIs. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. No patches or fixed versions have been published at the time of disclosure, and no known exploits have been reported in the wild. The CVSS v3.0 score of 8.6 reflects a high severity due to the ease of exploitation and the significant confidentiality impact. The vulnerability affects all esm.sh users running vulnerable versions, especially those relying on the /http(s) fetch route for dynamic content fetching.
Potential Impact
The SSRF vulnerability in esm.sh can have severe consequences for organizations using this CDN service. Attackers can leverage the vulnerability to access internal network resources, including metadata services, internal APIs, databases, or other sensitive endpoints that are not exposed externally. This can lead to data leakage, unauthorized information gathering, and potentially facilitate further internal network compromise. Since esm.sh is a CDN used globally by web developers, the attack surface is broad. The confidentiality impact is high as internal services may contain sensitive configuration, credentials, or proprietary data. Although the vulnerability does not directly impact integrity or availability, the information gained through SSRF can be used in chained attacks to escalate privileges or disrupt services. Organizations relying on esm.sh for production or development environments are at risk, especially if internal services are accessible from the esm.sh server network. The lack of a patch increases the urgency for mitigation. The vulnerability could be exploited by remote attackers without authentication or user interaction, increasing the likelihood of exploitation once publicized.
Mitigation Recommendations
Until an official patch is released, organizations should implement several practical mitigations: 1) Avoid using esm.sh versions up to 137 in production environments, or disable the /http(s) fetch route if possible. 2) Employ network-level controls such as firewall rules or egress filtering on servers running esm.sh to restrict outbound requests to trusted external IPs only, preventing internal network access via SSRF. 3) Use DNS filtering or monitoring to detect and block suspicious DNS alias domains that could be used to bypass hostname checks. 4) Monitor network traffic and logs for unusual or unexpected requests originating from esm.sh servers targeting internal IP ranges. 5) Consider isolating esm.sh usage in segmented network environments with limited access to sensitive internal services. 6) Engage with the esm-dev project or community to track patch releases and apply updates promptly once available. 7) Review internal services for exposure risk and implement authentication and authorization controls to limit damage if accessed via SSRF. These targeted mitigations go beyond generic advice by focusing on network controls, DNS monitoring, and service isolation specific to the nature of this SSRF vulnerability.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, India, Canada, Australia, Netherlands, China, Brazil
CVE-2026-27730: CWE-918: Server-Side Request Forgery (SSRF) in esm-dev esm.sh
Description
esm.sh is a no-build content delivery network (CDN) for web development. Versions up to and including 137 have an SSRF vulnerability (CWE-918) in esm.sh’s `/http(s)` fetch route. The service tries to block localhost/internal targets, but the validation is based on hostname string checks and can be bypassed using DNS alias domains. This allows an external requester to make the esm.sh server fetch internal localhost services. As of time of publication, no known patched versions exist.
AI-Powered Analysis
Technical Analysis
esm.sh is a no-build CDN service widely used in web development to serve JavaScript modules without requiring local builds. Versions up to and including 137 contain a Server-Side Request Forgery (SSRF) vulnerability identified as CVE-2026-27730 (CWE-918). The vulnerability resides in the /http(s) fetch route, which allows external users to request esm.sh to fetch arbitrary URLs. To prevent abuse, esm.sh attempts to block requests targeting localhost or internal network addresses by performing hostname string checks. However, this validation is insufficient and can be bypassed by using DNS alias domains that resolve to internal IP addresses, effectively tricking the service into fetching internal resources. This can lead to unauthorized access to internal services that are otherwise inaccessible externally, potentially exposing sensitive data or internal APIs. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. No patches or fixed versions have been published at the time of disclosure, and no known exploits have been reported in the wild. The CVSS v3.0 score of 8.6 reflects a high severity due to the ease of exploitation and the significant confidentiality impact. The vulnerability affects all esm.sh users running vulnerable versions, especially those relying on the /http(s) fetch route for dynamic content fetching.
Potential Impact
The SSRF vulnerability in esm.sh can have severe consequences for organizations using this CDN service. Attackers can leverage the vulnerability to access internal network resources, including metadata services, internal APIs, databases, or other sensitive endpoints that are not exposed externally. This can lead to data leakage, unauthorized information gathering, and potentially facilitate further internal network compromise. Since esm.sh is a CDN used globally by web developers, the attack surface is broad. The confidentiality impact is high as internal services may contain sensitive configuration, credentials, or proprietary data. Although the vulnerability does not directly impact integrity or availability, the information gained through SSRF can be used in chained attacks to escalate privileges or disrupt services. Organizations relying on esm.sh for production or development environments are at risk, especially if internal services are accessible from the esm.sh server network. The lack of a patch increases the urgency for mitigation. The vulnerability could be exploited by remote attackers without authentication or user interaction, increasing the likelihood of exploitation once publicized.
Mitigation Recommendations
Until an official patch is released, organizations should implement several practical mitigations: 1) Avoid using esm.sh versions up to 137 in production environments, or disable the /http(s) fetch route if possible. 2) Employ network-level controls such as firewall rules or egress filtering on servers running esm.sh to restrict outbound requests to trusted external IPs only, preventing internal network access via SSRF. 3) Use DNS filtering or monitoring to detect and block suspicious DNS alias domains that could be used to bypass hostname checks. 4) Monitor network traffic and logs for unusual or unexpected requests originating from esm.sh servers targeting internal IP ranges. 5) Consider isolating esm.sh usage in segmented network environments with limited access to sensitive internal services. 6) Engage with the esm-dev project or community to track patch releases and apply updates promptly once available. 7) Review internal services for exposure risk and implement authentication and authorization controls to limit damage if accessed via SSRF. These targeted mitigations go beyond generic advice by focusing on network controls, DNS monitoring, and service isolation specific to the nature of this SSRF vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-23T18:37:14.789Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 699f6203b7ef31ef0b50607d
Added to database: 2/25/2026, 8:56:35 PM
Last enriched: 2/25/2026, 9:11:31 PM
Last updated: 2/26/2026, 12:45:10 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27808: CWE-918: Server-Side Request Forgery (SSRF) in axllent mailpit
MediumCVE-2026-27804: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in parse-community parse-server
CriticalCVE-2026-27735: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in modelcontextprotocol servers
MediumCVE-2026-27818: CWE-20: Improper Input Validation in TerriaJS terriajs-server
HighCVE-2026-27812: CWE-116: Improper Encoding or Escaping of Output in Wei-Shaw sub2api
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.