SummaryUsers with webhook permissions can conduct SSRF via webhooks. If they have permission to view the webhook logs, the (partial) request response is also disclosed

DetailsWhen sending webhooks, the destination is not validated, causing SSRF.


ImpactBypass of firewalls to interact with internal services.
See https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/  for more potential impact.

Resources https://cheatsheetseries.owasp.org/cheatsheets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet.html  for more information on SSRF and its fix.
History

Wed, 03 Sep 2025 09:45:00 +0000

Type Values Removed Values Added
Description SummaryUsers with webhook permissions can conduct SSRF via webhooks. If they have permission to view the webhook logs, the (partial) request response is also disclosed DetailsWhen sending webhooks, the destination is not validated, causing SSRF. ImpactBypass of firewalls to interact with internal services. See https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/  for more potential impact. Resources https://cheatsheetseries.owasp.org/cheatsheets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet.html  for more information on SSRF and its fix.
Title SSRF via webhook function
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Mautic

Published:

Updated: 2025-09-03T09:39:01.005Z

Reserved: 2025-09-02T08:22:33.758Z

Link: CVE-2025-9821

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-03T10:15:38.133

Modified: 2025-09-03T10:15:38.133

Link: CVE-2025-9821

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.