Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/esm-dev/esm.sh
  4. ›
  5. CVE-2026-27730

CVE-2026-27730: esm.sh has SSRF localhost/private-network bypass in `/http(s)` module route

February 25, 2026 (updated March 2, 2026)

An SSRF vulnerability (CWE-918) exists in esm.sh’s /http(s) fetch route. The service tries to block localhost/internal targets, but the validation is based on hostname string checks and can be bypassed using DNS alias domains (for example, 127.0.0.1.nip.io resolving to 127.0.0.1). This allows an external requester to make the esm.sh server fetch internal localhost services. Severity: High (depending on deployment network exposure).

References

  • github.com/advisories/GHSA-p2v6-84h2-5x4r
  • github.com/esm-dev/esm.sh
  • github.com/esm-dev/esm.sh/commit/0593516c4cfab49ad3b4900416a8432ff2e23eb0
  • github.com/esm-dev/esm.sh/pull/1149
  • github.com/esm-dev/esm.sh/releases/tag/v137
  • github.com/esm-dev/esm.sh/security/advisories/GHSA-p2v6-84h2-5x4r
  • nvd.nist.gov/vuln/detail/CVE-2026-27730

Code Behaviors & Features

Detect and mitigate CVE-2026-27730 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.0.0-20250616164159-0593516c4cfa

Fixed versions

  • 0.0.0-20250616164159-0593516c4cfa

Solution

Upgrade to version 0.0.0-20250616164159-0593516c4cfa or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-918: Server-Side Request Forgery (SSRF)

Source file

go/github.com/esm-dev/esm.sh/CVE-2026-27730.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:16:46 +0000.