Miggo Logo

CVE-2025-62505: Lobe Chat vulnerable to Server-Side Request Forgery with native web fetch module

3

CVSS Score
3.1

Basic Information

EPSS Score
-
Published
10/17/2025
Updated
10/17/2025
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
@lobehub/chatnpm<= 1.136.11.136.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability analysis identified a Server-Side Request Forgery (SSRF) flaw in the Lobe Chat application. The root cause is the naive crawl implementation in the @lobehub/web-crawler package, which is triggered via the tools.search.crawlPages tRPC endpoint when a user specifies "impls": ["naive"]. The commit 8d59583dca16f218b99213d641733d8ba77f182c provides clear evidence of the vulnerability. The patch for this vulnerability replaces the native fetch call with ssrfSafeFetch inside the naive function in packages/web-crawler/src/crawImpl/naive.ts. This change directly points to the naive function as the location of the vulnerability. During exploitation, a profiler would show this naive function being executed as it processes the malicious URL, making it the key runtime indicator for this SSRF vulnerability.

Vulnerable functions

naive
packages/web-crawler/src/crawImpl/naive.ts
The `naive` function is an asynchronous function that implements the `CrawlImpl` type. It was using the standard `fetch` API to retrieve content from a user-provided URL without any validation or sanitization. This allows an attacker to craft a request to internal network resources or metadata services, leading to a Server-Side Request Forgery (SSRF) vulnerability. The patch replaces the insecure `fetch` call with `ssrfSafeFetch` to mitigate this issue.

WAF Protection Rules

WAF Rule

### Vuln*r**ility **s*ription --- Vuln*r**ility Ov*rvi*w - W**n t** *li*nt s*n*s *n *r*itr*ry URL *rr*y *n* impl: ["n*iv*"] to t** tRP* *n*point tools.s**r**.*r*wlP***s, t** s*rv*r issu*s out*oun* *TTP r*qu*sts *ir**tly to t*os* URLs. T**r* is no 

Reasoning

T** vuln*r**ility *n*lysis i**nti*i** * S*rv*r-Si** R*qu*st *or**ry (SSR*) *l*w in t** Lo** ***t *ppli**tion. T** root **us* is t** `n*iv*` *r*wl impl*m*nt*tion in t** `@lo***u*/w**-*r*wl*r` p**k***, w*i** is tri***r** vi* t** `tools.s**r**.*r*wlP***