CVE-2025-62505: Lobe Chat vulnerable to Server-Side Request Forgery with native web fetch module
Since the server performs outbound requests to internal networks, localhost, and metadata endpoints, an attacker can abuse the server’s network position to access internal resources (internal APIs, management ports, cloud metadata, etc.).
As a result, this can lead to exposure of internal system information, leakage of authentication tokens/secret keys (e.g., IMDSv1/v2), misuse of internal admin interfaces, and provide a foothold for further lateral movement.
By leveraging user-supplied impls to force the unfiltered naive implementation, SSRF defenses—such as blocking private/metadata IPs, DNS re-validation/re-resolution, and redirect restrictions—can be bypassed.
References
- github.com/advisories/GHSA-fgx4-p8xf-qhp9
- github.com/lobehub/lobe-chat
- github.com/lobehub/lobe-chat/blob/d942a635b36a231156c60d824afa573af8032572/packages/web-crawler/src/crawImpl/naive.ts
- github.com/lobehub/lobe-chat/commit/8d59583dca16f218b99213d641733d8ba77f182c
- github.com/lobehub/lobe-chat/security/advisories/GHSA-fgx4-p8xf-qhp9
- nvd.nist.gov/vuln/detail/CVE-2025-62505
Code Behaviors & Features
Detect and mitigate CVE-2025-62505 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →