Users are recommended to upgrade to version 1.12.0 or use the master branch , which fixes this issue.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-54889 | Apache EventMesh Vulnerable to Server-Side Request Forgery in WebhookUtil.java |
Github GHSA |
GHSA-hf86-8x8v-h7vc | Apache EventMesh Vulnerable to Server-Side Request Forgery in WebhookUtil.java |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 21 Aug 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:apache:eventmesh:*:*:*:*:*:*:*:* |
Thu, 21 Aug 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache eventmesh Apple Apple macos Linux Linux linux Microsoft Microsoft windows |
|
| Vendors & Products |
Apache
Apache eventmesh Apple Apple macos Linux Linux linux Microsoft Microsoft windows |
Wed, 20 Aug 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 20 Aug 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CWE-918 Server-Side Request Forgery (SSRF) in eventmesh-runtime module in WebhookUtil.java on windows\linux\mac os e.g. allows the attacker can abuse functionality on the server to read or update internal resources. Users are recommended to upgrade to version 1.12.0 or use the master branch , which fixes this issue. | |
| Title | Apache EventMesh Runtime: SSRF | |
| Weaknesses | CWE-918 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-08-20T13:20:27.851Z
Reserved: 2024-07-05T03:29:51.640Z
Link: CVE-2024-39954
Updated: 2025-08-20T13:20:12.441Z
Status : Analyzed
Published: 2025-08-20T09:15:27.297
Modified: 2025-08-21T18:25:41.767
Link: CVE-2024-39954
No data.
OpenCVE Enrichment
Updated: 2025-08-21T12:59:02Z
EUVD
Github GHSA