We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-53018

Lychee has Server-Side Request Forgery (SSRF) in Photo::fromUrl API via unvalidated remote image URLs



Description

Lychee is a free, open-source photo-management tool. Prior to version 6.6.13, a critical Server-Side Request Forgery (SSRF) vulnerability exists in the `/api/v2/Photo::fromUrl` endpoint. This flaw lets an attacker instruct the application’s backend to make HTTP requests to any URL they choose. Consequently, internal network resources—such as localhost services or cloud-provider metadata endpoints—become reachable. The endpoint takes a URL from the user and calls it server-side via fopen() without any safeguards. There is no IP address validation, nor are there any allow-list, timeout, or size restrictions. Because of this, attackers can point the application at internal targets. Using this flaw, an attacker can perform internal port scans or retrieve sensitive cloud metadata. Version 6.6.13 contains a patch for the issue.

Reserved 2025-06-24 | Published 2025-06-27 | Updated 2025-06-27 | Assigner GitHub_M


LOW: 3.0CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

< 6.6.13
affected

References

github.com/...Lychee/security/advisories/GHSA-cpgw-wgf3-xc6v

github.com/...ommit/9dc162eefe56ce185ac1d59da42ee557933d914d

cve.org (CVE-2025-53018)

nvd.nist.gov (CVE-2025-53018)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-53018

Support options

Helpdesk Chat, Email, Knowledgebase