Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vvxf-wj5w-6gj5 | hemmelig allows SSRF Filter bypass via Secret Request functionality |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 06 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hemmelig
Hemmelig hemmelig |
|
| CPEs | cpe:2.3:a:hemmelig:hemmelig:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Hemmelig
Hemmelig hemmelig |
Mon, 29 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 29 Dec 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Hemmelig is a messing app with with client-side encryption and self-destructing messages. Prior to version 7.3.3, a Server-Side Request Forgery (SSRF) filter bypass vulnerability exists in the webhook URL validation of the Secret Requests feature. The application attempts to block internal/private IP addresses but can be bypassed using DNS rebinding or open redirect services. This allows an authenticated user to make the server initiate HTTP requests to internal network resources. Version 7.3.3 contains a patch for the issue. | |
| Title | Hemmelig has SSRF Filter bypass in Secret Request functionality | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-29T16:50:43.152Z
Reserved: 2025-12-29T14:50:49.039Z
Link: CVE-2025-69206
Updated: 2025-12-29T16:42:31.831Z
Status : Analyzed
Published: 2025-12-29T16:15:44.090
Modified: 2026-01-06T16:30:10.943
Link: CVE-2025-69206
No data.
OpenCVE Enrichment
No data.
Github GHSA