-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stemmed from two key patterns: 1) API methods accepting arbitrary URIs without validation (ApiClient methods), and 2) ID parameters being used in URI construction without proper sanitization (various API methods). The commit adds critical validation through HasValidBaseUri checks for URIs and NotAUrl checks for ID parameters, directly addressing SSRF vectors. The affected functions are clearly identified through the patch's focus on URI validation in ApiClient and ID sanitization in API implementations.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| TrueLayer.Client | nuget | < 1.6.0 | 1.6.0 |
Ongoing coverage of React2Shell