


Perceptive Security
SOC/SIEM Consultancy

WeasyPrint helps web developers to create PDF documents. Prior to version 68.0, a server-side request forgery (SSRF) protection bypass exists in WeasyPrint's `d…
Published:
18 januari 2026 om 23:00:00
Alert date:
19 januari 2026 om 17:02:28
Source:
nvd.nist.gov
Web Technologies, Supply Chain & Dependencies
A server-side request forgery (SSRF) protection bypass vulnerability exists in WeasyPrint's default_url_fetcher prior to version 68.0. The vulnerability allows attackers to access internal network resources including localhost services and cloud metadata endpoints, even when developers have implemented custom url_fetcher security controls. The issue occurs because the underlying urllib library automatically follows HTTP redirects without re-validating destinations against security policies. This bypass can lead to unauthorized access to internal systems and sensitive cloud metadata. Version 68.0 includes a patch that addresses this vulnerability.
Technical details
Mitigation steps:
Affected products:
WeasyPrint
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2025-68616
https://github.com/Kozea/WeasyPrint/commit/b6a14f0f3f4ce9c0c75c1a2d73cb1c5d43f0e565
https://github.com/Kozea/WeasyPrint/security/advisories/GHSA-983w-rhvv-gwmv
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
