{"id":"CVE-2022-25850","details":"The package github.com/hoppscotch/proxyscotch before 1.0.0 are vulnerable to Server-side Request Forgery (SSRF) when interceptor mode is set to proxy. It occurs when an HTTP request is made by a backend server to an untrusted URL submitted by a user. It leads to a leakage of sensitive information from the server.","aliases":["GHSA-5hjh-c26m-xw8w"],"modified":"2026-03-13T22:15:23.306159Z","published":"2022-05-01T16:15:08.823Z","related":["SNYK-GOLANG-GITHUBCOMHOPPSCOTCHPROXYSCOTCH-2435228"],"references":[{"type":"FIX","url":"https://github.com/hoppscotch/proxyscotch/commit/de67380f62f907f201d75854b76024ba4885fab7"},{"type":"EVIDENCE","url":"https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMHOPPSCOTCHPROXYSCOTCH-2435228"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/hoppscotch/proxyscotch","events":[{"introduced":"0"},{"fixed":"de67380f62f907f201d75854b76024ba4885fab7"}]},{"type":"GIT","repo":"https://github.com/hoppscotch/proxyscotch","events":[{"introduced":"0"},{"fixed":"de67380f62f907f201d75854b76024ba4885fab7"}]}],"versions":["v0.0.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-25850.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"1.0.0"}]},{"events":[{"introduced":"0"},{"fixed":"1.0.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}