CVE-2025-57818

medium

Description

Firecrawl turns entire websites into LLM-ready markdown or structured data. Prior to version 2.0.1, a server-side request forgery (SSRF) vulnerability was discovered in Firecrawl's webhook functionality. Authenticated users could configure a webhook to an internal URL and send POST requests with arbitrary headers, which may have allowed access to internal systems. This has been fixed in version 2.0.1. If upgrading is not possible, it is recommend to isolate Firecrawl from any sensitive internal systems.

References

https://github.com/firecrawl/firecrawl/security/advisories/GHSA-p2wg-prhf-jx79

https://github.com/firecrawl/firecrawl/releases/tag/v2.0.1

https://github.com/firecrawl/firecrawl/commit/e8cf0985b07968061a6b684b58097732e827ed46

https://github.com/firecrawl/firecrawl/commit/b15fae51a760e9810a66bbfde5d5693d0df3fbeb

Details

Source: Mitre, NVD

Published: 2025-08-26

Updated: 2025-08-29

Risk Information

CVSS v2

Base Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 6.3

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Severity: Medium

EPSS

EPSS: 0.00036