Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. ssrfcheck
  4. ›
  5. CVE-2026-43929

CVE-2026-43929: ssrfcheck Vulnerable to Server-Side Request Forgery (SSRF) and Incomplete List of Disallowed Inputs

May 5, 2026

ssrfcheck v1.3.0 (latest) fails to block Server-Side Request Forgery attacks when the target private IP address is encoded as an IPv4-mapped IPv6 address (e.g. http://[::ffff:127.0.0.1]/). The WHATWG URL parser built into Node.js silently normalizes the IPv4 notation inside the brackets to compressed hex form ([::ffff:7f00:1]) before the library’s private-IP regex ever runs. The regex was written to match dot-notation only and therefore never matches any real input — all seven IANA private IPv4 ranges, including the AWS/GCP/Azure metadata address 169.254.169.254, are bypassed. Any application using isSSRFSafeURL() to guard HTTP requests made with user-supplied URLs is fully exposed to SSRF.


References

  • github.com/advisories/GHSA-j4rj-2jr5-m439
  • github.com/felippe-regazio/ssrfcheck
  • github.com/felippe-regazio/ssrfcheck/security/advisories/GHSA-j4rj-2jr5-m439
  • nvd.nist.gov/vuln/detail/CVE-2026-43929

Code Behaviors & Features

Detect and mitigate CVE-2026-43929 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 1.3.0

Solution

Unfortunately, there is no solution available yet.

Impact 8.2 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-184: Incomplete List of Disallowed Inputs
  • CWE-918: Server-Side Request Forgery (SSRF)

Source file

npm/ssrfcheck/CVE-2026-43929.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 00:19:48 +0000.