Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-983w-rhvv-gwmv | WeasyPrint has a Server-Side Request Forgery (SSRF) Protection Bypass via HTTP Redirect |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 21 Jan 2026 01:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 20 Jan 2026 17:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kozea
Kozea weasyprint |
|
| Vendors & Products |
Kozea
Kozea weasyprint |
Tue, 20 Jan 2026 09:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 20 Jan 2026 00:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WeasyPrint helps web developers to create PDF documents. Prior to version 68.0, a server-side request forgery (SSRF) protection bypass exists in WeasyPrint's `default_url_fetcher`. The vulnerability allows attackers to access internal network resources (such as `localhost` services or cloud metadata endpoints) even when a developer has implemented a custom `url_fetcher` to block such access. This occurs because the underlying `urllib` library follows HTTP redirects automatically without re-validating the new destination against the developer's security policy. Version 68.0 contains a patch for the issue. | |
| Title | WeasyPrint Vulnerable to Server-Side Request Forgery (SSRF) Protection Bypass via HTTP Redirect | |
| Weaknesses | CWE-601 CWE-918 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-20T15:42:46.352Z
Reserved: 2025-12-19T14:58:47.824Z
Link: CVE-2025-68616
Updated: 2026-01-20T15:42:29.841Z
Status : Received
Published: 2026-01-19T16:15:53.573
Modified: 2026-01-20T16:16:06.643
Link: CVE-2025-68616
OpenCVE Enrichment
Updated: 2026-01-20T17:43:30Z
Github GHSA