Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-22416 | private-ip vulnerable to Server-Side Request Forgery |
Github GHSA |
GHSA-9h3q-32c7-r533 | private-ip vulnerable to Server-Side Request Forgery |
Wed, 23 Jul 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 23 Jul 2025 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | All versions of the package private-ip are vulnerable to Server-Side Request Forgery (SSRF) where an attacker can provide an IP or hostname that resolves to a multicast IP address (224.0.0.0/4) which is not included as part of the private IP ranges in the package's source code. | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-07-23T15:14:07.504Z
Reserved: 2025-07-22T07:52:56.770Z
Link: CVE-2025-8020
Updated: 2025-07-23T14:24:06.401Z
Status : Deferred
Published: 2025-07-23T05:15:30.590
Modified: 2026-04-29T01:00:01.613
Link: CVE-2025-8020
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA