{"uuid": "3230b855-ef04-4998-b0c1-9d1136f486d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32013", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10641", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32013\n\ud83d\udd25 CVSS Score: 9.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: LNbits is a Lightning wallet and accounts system. A Server-Side Request Forgery (SSRF) vulnerability has been discovered in LNbits' LNURL authentication handling functionality. When processing LNURL authentication requests, the application accepts a callback URL parameter and makes an HTTP request to that URL using the httpx library with redirect following enabled. The application doesn't properly validate the callback URL, allowing attackers to specify internal network addresses and access internal resources.\n\ud83d\udccf Published: 2025-04-06T20:07:05.624Z\n\ud83d\udccf Modified: 2025-04-06T20:07:05.624Z\n\ud83d\udd17 References:\n1. https://github.com/lnbits/lnbits/security/advisories/GHSA-qp8j-p87f-c8cc", "creation_timestamp": "2025-04-06T20:43:59.000000Z"}