Server-side Request Forgery (SSRF) Affecting cors-anywhere package, versions *


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.53% (67th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-CORSANYWHERE-13109647
  • published28 Sept 2025
  • disclosed25 Sept 2025
  • creditRob Wu

Introduced: 25 Sep 2025

NewCVE-2020-36851  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

There is no fixed version for cors-anywhere.

Overview

cors-anywhere is a CORS Anywhere is a reverse proxy which adds CORS headers to the proxied request. Request URL is taken from the path

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the proxy process. An attacker can access internal-only endpoints, retrieve sensitive metadata, interact with internal APIs, and potentially compromise cloud resources by sending crafted requests that induce the server to make HTTP requests to arbitrary targets.

##Mitigation

  1. Restricting the proxy to trusted origins or authentication

  2. whitelisting allowed target hosts

  3. Preventing access to link-local and internal IP ranges

  4. Removing support for unsafe HTTP methods/headers

  5. Enabling cloud provider mitigations

  6. Deploying network-level protections.

CVSS Base Scores

version 4.0
version 3.1