CVE-2025-34469: Cowrie has a SSRF vulnerability in wget/curl emulation enabling DDoS amplification
(updated )
A Server-Side Request Forgery (SSRF) vulnerability in Cowrie’s emulated shell mode allows unauthenticated attackers to abuse the honeypot as an amplification vector for HTTP-based denial-of-service attacks against arbitrary third-party hosts.
References
- github.com/advisories/GHSA-83jg-m2pm-4jxj
- github.com/cowrie/cowrie
- github.com/cowrie/cowrie/issues/2622
- github.com/cowrie/cowrie/pull/2800
- github.com/cowrie/cowrie/releases/tag/v2.9.0
- github.com/cowrie/cowrie/security/advisories/GHSA-83jg-m2pm-4jxj
- nvd.nist.gov/vuln/detail/CVE-2025-34469
- www.cve.org/cverecord?id=CVE-2025-34469
- www.vulncheck.com/advisories/cowrie-unrestricted-wget-curl-emulation-enables-ssrf-based-ddos-amplification
Code Behaviors & Features
Detect and mitigate CVE-2025-34469 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →