Firecrawl turns entire websites into LLM-ready markdown or structured data. Prior to version 2.0.1, a server-side request forgery (SSRF) vulnerability was discovered in Firecrawl's webhook functionality. Authenticated users could configure a webhook to an internal URL and send POST requests with arbitrary headers, which may have allowed access to internal systems. This has been fixed in version 2.0.1. If upgrading is not possible, it is recommend to isolate Firecrawl from any sensitive internal systems.
References
Configurations
No configuration.
History
29 Aug 2025, 16:22
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
26 Aug 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-26 18:15
Updated : 2025-08-29 16:22
NVD link : CVE-2025-57818
Mitre link : CVE-2025-57818
CVE.ORG link : CVE-2025-57818
JSON object : View
Products Affected
No product.
CWE
CWE-918
Server-Side Request Forgery (SSRF)