-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| @lobehub/chat | npm | <= 0.150.5 | 0.150.6 |
The vulnerability stemmed from the original implementation of the /api/proxy endpoint's POST handler which: 1. Accepted raw user input as a URL without parsing/validation 2. Directly passed this input to fetch() 3. Lacked DNS resolution checks 4. Had no mechanism to prevent internal network targets. The fix introduced DNS lookup, IP validation using the 'ip' package, and internal network checks, confirming the original function's vulnerability. The pre-patch code's direct fetch(url) pattern with unvalidated input is a classic SSRF vulnerability pattern.
Ongoing coverage of React2Shell