CVE-2025-23221
Fedify has an Infinite loop and Blind SSRF found inside the Webfinger mechanism
Severity Score
5.4
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track*
*SSVC
Descriptions
Fedify is a TypeScript library for building federated server apps powered by ActivityPub and other standards. This vulnerability allows a user to maneuver the Webfinger mechanism to perform a GET request to any internal resource on any Host, Port, URL combination regardless of present security mechanisms, and forcing the victim’s server into an infinite loop causing Denial of Service. Moreover, this issue can also be maneuvered into performing a Blind SSRF attack. This vulnerability is fixed in 1.0.14, 1.1.11, 1.2.11, and 1.3.4.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track*
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2025-01-13 CVE Reserved
- 2025-01-20 CVE Published
- 2025-01-21 CVE Updated
- 2025-01-21 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')
- CWE-918: Server-Side Request Forgery (SSRF)
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://github.com/dahlia/fedify/commit/8be3c2038eebf4ae12481683a1e809b314be3151 | X_refsource_misc | |
https://github.com/dahlia/fedify/commit/c505eb82fcd6b5b17174c6659c29721bc801ab9a | X_refsource_misc | |
https://github.com/dahlia/fedify/commit/e921134dd5097586e4563ea80b9e8d1b5460a645 | X_refsource_misc | |
https://github.com/dahlia/fedify/security/advisories/GHSA-c59p-wq67-24wx | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Dahlia Search vendor "Dahlia" | Fedify Search vendor "Dahlia" for product "Fedify" | < 1.0.14 Search vendor "Dahlia" for product "Fedify" and version " < 1.0.14" | en |
Affected
| ||||||
Dahlia Search vendor "Dahlia" | Fedify Search vendor "Dahlia" for product "Fedify" | >= 1.1.0 < 1.1.11 Search vendor "Dahlia" for product "Fedify" and version " >= 1.1.0 < 1.1.11" | en |
Affected
| ||||||
Dahlia Search vendor "Dahlia" | Fedify Search vendor "Dahlia" for product "Fedify" | >= 1.2.0 < 1.2.11 Search vendor "Dahlia" for product "Fedify" and version " >= 1.2.0 < 1.2.11" | en |
Affected
| ||||||
Dahlia Search vendor "Dahlia" | Fedify Search vendor "Dahlia" for product "Fedify" | >= 1.3.0 < 1.3.4 Search vendor "Dahlia" for product "Fedify" and version " >= 1.3.0 < 1.3.4" | en |
Affected
|