{"id":"CVE-2025-25194","summary":"Server-Side Request Forgery (SSRF) in activitypub_federation","details":"Lemmy, a link aggregator and forum for the fediverse, is vulnerable to server-side request forgery via a dependency on activitypub_federation, a framework for ActivityPub federation in Rust. This vulnerability, which is present in versions 0.6.2 and prior of activitypub_federation and versions 0.19.8 and prior of Lemmy, allows a user to bypass any predefined hardcoded URL path or security anti-Localhost mechanism and perform an arbitrary GET request to any Host, Port and URL using a Webfinger Request. As of time of publication, a fix has not been made available.","aliases":["GHSA-7723-35v7-qcxw"],"modified":"2026-04-10T05:23:12.281364Z","published":"2025-02-10T22:14:32.302Z","database_specific":{"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/25xxx/CVE-2025-25194.json","cwe_ids":["CWE-918"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/25xxx/CVE-2025-25194.json"},{"type":"ADVISORY","url":"https://github.com/LemmyNet/lemmy/security/advisories/GHSA-7723-35v7-qcxw"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-25194"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/lemmynet/lemmy","events":[{"introduced":"0"},{"last_affected":"7d5669e8d3cbb2764f323d59067c15a3ad9f4176"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.19.8"}]}}],"versions":["0.10.0","0.10.0-rc.12","0.10.0-rc.13","0.10.0-rc.7","0.10.1","0.10.2","0.11.0","0.11.0-rc.1","0.11.1","0.11.2","0.11.3-rc.4","0.11.4-rc.16","0.12.0","0.12.0-rc.1","0.12.0-rc.2","0.13.0","0.13.0-rc.1","0.13.5-rc.7","0.13.6-rc.2","0.14.0","0.14.0-rc.1","0.14.0-rc.2","0.14.1","0.14.2","0.14.2-rc.1","0.14.3","0.15.0","0.15.0-rc.7","0.15.1","0.16.0","0.16.0-rc.1","0.16.0-rc.2","0.16.0-rc.3","0.16.0-rc.4","0.16.1","0.16.1-rc.1","0.16.2","0.16.2-rc.1","0.16.2-rc.2","0.16.2-rc.3","0.16.3","0.16.3-rc.1","0.16.5","0.17.0","0.17.0-rc.1","0.17.0-rc.3","0.17.0-rc.4","0.17.1","0.18.0","0.18.0-rc.1","0.18.0-rc.2","0.18.0-rc.3","0.18.0-rc.4","0.18.0-rc.5","0.18.0-rc.6","0.18.0-rc.8","0.18.1","0.18.1-rc.1","0.18.1-rc.10","0.18.1-rc.4","0.18.1-rc.9","0.18.4-beta.7","0.19.0","0.19.0-beta.7","0.19.0-rc.1","0.19.0-rc.10","0.19.0-rc.11","0.19.0-rc.12","0.19.0-rc.13","0.19.0-rc.14","0.19.0-rc.15","0.19.0-rc.16","0.19.0-rc.2","0.19.0-rc.3","0.19.0-rc.4","0.19.0-rc.5","0.19.0-rc.6","0.19.0-rc.7","0.19.0-rc.8","0.19.1-rc.1","0.19.1-rc.2","0.19.2","0.19.2-rc.1","0.19.2-rc.2","0.19.2-rc.4","0.19.2-rc.5","0.19.3","0.19.3-rc.1","0.19.4","0.19.4-beta.1","0.19.4-beta.3","0.19.4-beta.4","0.19.4-beta.5","0.19.4-beta.6","0.19.4-beta.7","0.19.4-beta.8","0.19.4-rc.1","0.19.4-rc.10","0.19.4-rc.11","0.19.4-rc.2","0.19.4-rc.3","0.19.4-rc.4","0.19.4-rc.5","0.19.4-rc.6","0.19.4-rc.7","0.19.4-rc.8","0.19.4-rc.9","0.19.5","0.19.5-alpha.1","0.19.5-alpha.2","0.19.5-alpha.3","0.19.6","0.19.6-beta.14","0.19.6-beta.15","0.19.6-beta.8","0.19.6-beta.9","0.19.7","0.19.7-beta.1","0.19.7-beta.2","0.19.8","0.19.8-beta.0","0.9.0","0.9.1","0.9.2","0.9.3","0.9.4","0.9.5","0.9.6","0.9.7","0.9.8","0.9.9","v0.0.7.4","v0.0.8.1","v0.0.8.2","v0.0.8.3","v0.4.0.3","v0.5.10","v0.7.17","v0.7.18","v0.7.19","v0.7.20","v0.7.21","v0.7.22","v0.7.23","v0.7.24","v0.7.25","v0.7.26","v0.7.28","v0.7.29","v0.7.3","v0.7.30","v0.7.31","v0.7.32","v0.7.33","v0.7.34","v0.7.35","v0.7.36","v0.7.37","v0.7.38","v0.7.39","v0.7.4","v0.7.40","v0.7.41","v0.7.42","v0.7.43","v0.7.44","v0.7.46","v0.7.47","v0.7.48","v0.7.49","v0.7.5","v0.7.50","v0.7.52","v0.7.53","v0.7.54","v0.7.55","v0.7.56","v0.7.57","v0.7.59","v0.7.6","v0.7.61","v0.7.62","v0.7.63","v0.7.64","v0.7.7","v0.7.8","v0.8.0","v0.8.1","v0.8.10","v0.8.3","v0.8.5","v0.8.6","v0.8.7","v0.8.8","v0.8.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-25194.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N"}]}