Home

Description

esm.sh is a no-build content delivery network (CDN) for web development. In version 136, esm.sh is vulnerable to a full-response SSRF, allowing an attacker to retrieve information from internal websites through the vulnerability. Version 137 fixes the vulnerability.

PUBLISHED Reserved 2025-06-13 | Published 2026-02-25 | Updated 2026-02-25 | Assigner GitHub_M




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

= 136
affected

References

github.com/...esm.sh/security/advisories/GHSA-3c9r-837r-qqm4

github.com/esm-dev/esm.sh/pull/1149

github.com/...ommit/0593516c4cfab49ad3b4900416a8432ff2e23eb0

github.com/...a964abde468fc61f8bd89e/internal/fetch/fetch.go

github.com/...749e77fa964abde468fc61f8bd89e/server/router.go

github.com/esm-dev/esm.sh/releases/tag/v137

cve.org (CVE-2025-50180)

nvd.nist.gov (CVE-2025-50180)

Download JSON