Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vp8w-wj4m-3r7j | evershop allows unauthenticated attackers to force server to initiate HTTP request via "GET /images" API |
Mon, 12 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:evershop:evershop:*:*:*:*:*:node.js:*:* |
Tue, 06 Jan 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Evershop
Evershop evershop |
|
| Vendors & Products |
Evershop
Evershop evershop |
Tue, 06 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 05 Jan 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-918 | |
| Metrics |
cvssV3_1
|
Mon, 05 Jan 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Blind Server-Side Request Forgery (SSRF) vulnerability in evershop 2.1.0 and prior allows unauthenticated attackers to force the server to initiate an HTTP request via the "GET /images" API. The vulnerability occurs due to insufficient validation of the "src" query parameter, which permits arbitrary HTTP or HTTPS URIs, resulting in unexpected requests against internal and external networks. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-05T21:26:10.984Z
Reserved: 2025-12-08T00:00:00.000Z
Link: CVE-2025-67427
Updated: 2026-01-05T21:25:16.441Z
Status : Analyzed
Published: 2026-01-05T20:16:03.350
Modified: 2026-01-12T18:12:22.640
Link: CVE-2025-67427
No data.
OpenCVE Enrichment
Updated: 2026-01-06T14:17:05Z
Github GHSA