Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 20 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nucleoidai
Nucleoidai nucleoid |
|
| Vendors & Products |
Nucleoidai
Nucleoidai nucleoid |
Fri, 17 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 16 Oct 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in NucleoidAI Nucleoid up to 0.7.10. The impacted element is the function extension.apply of the file /src/cluster.ts of the component Outbound Request Handler. Such manipulation of the argument https/ip/port/path/headers leads to server-side request forgery. The attack may be performed from remote. | |
| Title | NucleoidAI Nucleoid Outbound Request cluster.ts extension.apply server-side request forgery | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-10-17T14:10:35.740Z
Reserved: 2025-10-16T14:28:29.618Z
Link: CVE-2025-11864
Updated: 2025-10-17T14:10:31.596Z
Status : Deferred
Published: 2025-10-16T21:15:34.883
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-11864
No data.
OpenCVE Enrichment
Updated: 2025-10-20T13:25:07Z