CWE-918 Server-Side Request Forgery (SSRF) in eventmesh-runtime module in WebhookUtil.java on windows\linux\mac os e.g. allows the attacker can abuse functionality on the server to read or update internal resources. Users are recommended to upgrade to version 1.12.0 or use the master branch , which fixes this issue.
History

Thu, 21 Aug 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache eventmesh
Apple
Apple macos
Linux
Linux linux
Microsoft
Microsoft windows
Vendors & Products Apache
Apache eventmesh
Apple
Apple macos
Linux
Linux linux
Microsoft
Microsoft windows

Wed, 20 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 Aug 2025 09:00:00 +0000

Type Values Removed Values Added
Description CWE-918 Server-Side Request Forgery (SSRF) in eventmesh-runtime module in WebhookUtil.java on windows\linux\mac os e.g. allows the attacker can abuse functionality on the server to read or update internal resources. Users are recommended to upgrade to version 1.12.0 or use the master branch , which fixes this issue.
Title Apache EventMesh Runtime: SSRF
Weaknesses CWE-918
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2025-08-20T08:56:41.560Z

Updated: 2025-08-20T13:20:27.851Z

Reserved: 2024-07-05T03:29:51.640Z

Link: CVE-2024-39954

cve-icon Vulnrichment

Updated: 2025-08-20T13:20:12.441Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-20T09:15:27.297

Modified: 2025-08-20T14:39:07.860

Link: CVE-2024-39954

cve-icon Redhat

No data.