top of page
perceptive_background_267k.jpg

WeasyPrint helps web developers to create PDF documents. Prior to version 68.0, a server-side request forgery (SSRF) protection bypass exists in WeasyPrint's `d…

Published:

18 januari 2026 om 23:00:00

Alert date:

19 januari 2026 om 17:02:28

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Supply Chain & Dependencies

A server-side request forgery (SSRF) protection bypass vulnerability exists in WeasyPrint's default_url_fetcher prior to version 68.0. The vulnerability allows attackers to access internal network resources including localhost services and cloud metadata endpoints, even when developers have implemented custom url_fetcher security controls. The issue occurs because the underlying urllib library automatically follows HTTP redirects without re-validating destinations against security policies. This bypass can lead to unauthorized access to internal systems and sensitive cloud metadata. Version 68.0 includes a patch that addresses this vulnerability.

Technical details

Mitigation steps:

Affected products:

WeasyPrint

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page