{"api_version":"1","generated_at":"2026-05-13T07:43:33+00:00","cve":"CVE-2025-9799","urls":{"html":"https://cve.report/CVE-2025-9799","api":"https://cve.report/api/cve/CVE-2025-9799.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2025-9799","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2025-9799"},"summary":{"title":"Langfuse Webhook promptRouter.ts promptChangeEventSourcing server-side request forgery","description":"A security flaw has been discovered in Langfuse up to 3.88.0. Affected by this vulnerability is the function promptChangeEventSourcing of the file web/src/features/prompts/server/routers/promptRouter.ts of the component Webhook Handler. Performing manipulation results in server-side request forgery. The attack may be initiated remotely. A high degree of complexity is needed for the attack. The exploitation appears to be difficult. The exploit has been released to the public and may be exploited.","state":"PUBLISHED","assigner":"VulDB","published_at":"2025-09-01 22:15:31","updated_at":"2026-04-29 01:00:01"},"problem_types":["CWE-918","CWE-918 Server-Side Request Forgery"],"metrics":[{"version":"4.0","source":"cna@vuldb.com","type":"Secondary","score":"1.3","severity":"LOW","vector":"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","data":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":1.3,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}},{"version":"4.0","source":"CNA","type":"DECLARED","score":"2.3","severity":"LOW","vector":"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","data":{"baseScore":2.3,"baseSeverity":"LOW","vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","version":"4.0"}},{"version":"3.1","source":"cna@vuldb.com","type":"Secondary","score":"5","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L","baseScore":5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"5","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","data":{"baseScore":5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","version":"3.1"}},{"version":"3.0","source":"CNA","type":"DECLARED","score":"5","severity":"MEDIUM","vector":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","data":{"baseScore":5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","version":"3.0"}},{"version":"2.0","source":"cna@vuldb.com","type":"Secondary","score":"4.6","severity":"","vector":"AV:N/AC:H/Au:S/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:H/Au:S/C:P/I:P/A:P","baseScore":4.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}},{"version":"2.0","source":"CNA","type":"DECLARED","score":"4.6","severity":"","vector":"AV:N/AC:H/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR","data":{"baseScore":4.6,"vectorString":"AV:N/AC:H/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR","version":"2.0"}}],"references":[{"url":"https://github.com/langfuse/langfuse/issues/8522#issue-3320549867","name":"https://github.com/langfuse/langfuse/issues/8522#issue-3320549867","refsource":"cna@vuldb.com","tags":["Exploit","Issue Tracking"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/langfuse/langfuse/issues/8522","name":"https://github.com/langfuse/langfuse/issues/8522","refsource":"cna@vuldb.com","tags":["Exploit","Issue Tracking"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/?ctiid.322114","name":"https://vuldb.com/?ctiid.322114","refsource":"cna@vuldb.com","tags":["Permissions Required","VDB Entry"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/?id.322114","name":"https://vuldb.com/?id.322114","refsource":"cna@vuldb.com","tags":["Third Party Advisory","VDB Entry"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/?submit.641128","name":"https://vuldb.com/?submit.641128","refsource":"cna@vuldb.com","tags":["Third Party Advisory","VDB Entry"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2025-9799","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-9799","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.0","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.1","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.2","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.3","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.4","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.5","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.6","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.7","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.8","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.9","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.10","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.11","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.12","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.13","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.14","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.15","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.16","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.17","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.18","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.19","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.20","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.21","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.22","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.23","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.24","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.25","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.26","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.27","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.28","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.29","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.30","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.31","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.32","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.33","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.34","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.35","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.36","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.37","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.38","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.39","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.40","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.41","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.42","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.43","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.44","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.45","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.46","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.47","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.48","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.49","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.50","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.51","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.52","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.53","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.54","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.55","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.56","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.57","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.58","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.59","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.60","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.61","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.62","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.63","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.64","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.65","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.66","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.67","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.68","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.69","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.70","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.71","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.72","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.73","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.74","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.75","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.76","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.77","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.78","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.79","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.80","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.81","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.82","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.83","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.84","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.85","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.86","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.87","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Langfuse","version":"affected 3.88.0","platforms":[]}],"timeline":[{"source":"CNA","time":"2025-09-01T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"source":"CNA","time":"2025-09-01T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"source":"CNA","time":"2025-09-01T14:29:18.000Z","lang":"en","value":"VulDB entry last update"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"ZAST.AI (VulDB User)","lang":"en"}],"nvd_cpes":[{"cve_year":"2025","cve_id":"9799","vulnerable":"1","versionEndIncluding":"3.88.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"langfuse","cpe5":"langfuse","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2025-9799","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2025-09-02T19:51:53.283383Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2025-09-02T20:10:18.439Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"modules":["Webhook Handler"],"product":"Langfuse","vendor":"n/a","versions":[{"status":"affected","version":"3.0"},{"status":"affected","version":"3.1"},{"status":"affected","version":"3.2"},{"status":"affected","version":"3.3"},{"status":"affected","version":"3.4"},{"status":"affected","version":"3.5"},{"status":"affected","version":"3.6"},{"status":"affected","version":"3.7"},{"status":"affected","version":"3.8"},{"status":"affected","version":"3.9"},{"status":"affected","version":"3.10"},{"status":"affected","version":"3.11"},{"status":"affected","version":"3.12"},{"status":"affected","version":"3.13"},{"status":"affected","version":"3.14"},{"status":"affected","version":"3.15"},{"status":"affected","version":"3.16"},{"status":"affected","version":"3.17"},{"status":"affected","version":"3.18"},{"status":"affected","version":"3.19"},{"status":"affected","version":"3.20"},{"status":"affected","version":"3.21"},{"status":"affected","version":"3.22"},{"status":"affected","version":"3.23"},{"status":"affected","version":"3.24"},{"status":"affected","version":"3.25"},{"status":"affected","version":"3.26"},{"status":"affected","version":"3.27"},{"status":"affected","version":"3.28"},{"status":"affected","version":"3.29"},{"status":"affected","version":"3.30"},{"status":"affected","version":"3.31"},{"status":"affected","version":"3.32"},{"status":"affected","version":"3.33"},{"status":"affected","version":"3.34"},{"status":"affected","version":"3.35"},{"status":"affected","version":"3.36"},{"status":"affected","version":"3.37"},{"status":"affected","version":"3.38"},{"status":"affected","version":"3.39"},{"status":"affected","version":"3.40"},{"status":"affected","version":"3.41"},{"status":"affected","version":"3.42"},{"status":"affected","version":"3.43"},{"status":"affected","version":"3.44"},{"status":"affected","version":"3.45"},{"status":"affected","version":"3.46"},{"status":"affected","version":"3.47"},{"status":"affected","version":"3.48"},{"status":"affected","version":"3.49"},{"status":"affected","version":"3.50"},{"status":"affected","version":"3.51"},{"status":"affected","version":"3.52"},{"status":"affected","version":"3.53"},{"status":"affected","version":"3.54"},{"status":"affected","version":"3.55"},{"status":"affected","version":"3.56"},{"status":"affected","version":"3.57"},{"status":"affected","version":"3.58"},{"status":"affected","version":"3.59"},{"status":"affected","version":"3.60"},{"status":"affected","version":"3.61"},{"status":"affected","version":"3.62"},{"status":"affected","version":"3.63"},{"status":"affected","version":"3.64"},{"status":"affected","version":"3.65"},{"status":"affected","version":"3.66"},{"status":"affected","version":"3.67"},{"status":"affected","version":"3.68"},{"status":"affected","version":"3.69"},{"status":"affected","version":"3.70"},{"status":"affected","version":"3.71"},{"status":"affected","version":"3.72"},{"status":"affected","version":"3.73"},{"status":"affected","version":"3.74"},{"status":"affected","version":"3.75"},{"status":"affected","version":"3.76"},{"status":"affected","version":"3.77"},{"status":"affected","version":"3.78"},{"status":"affected","version":"3.79"},{"status":"affected","version":"3.80"},{"status":"affected","version":"3.81"},{"status":"affected","version":"3.82"},{"status":"affected","version":"3.83"},{"status":"affected","version":"3.84"},{"status":"affected","version":"3.85"},{"status":"affected","version":"3.86"},{"status":"affected","version":"3.87"},{"status":"affected","version":"3.88.0"}]}],"credits":[{"lang":"en","type":"reporter","value":"ZAST.AI (VulDB User)"}],"descriptions":[{"lang":"en","value":"A security flaw has been discovered in Langfuse up to 3.88.0. Affected by this vulnerability is the function promptChangeEventSourcing of the file web/src/features/prompts/server/routers/promptRouter.ts of the component Webhook Handler. Performing manipulation results in server-side request forgery. The attack may be initiated remotely. A high degree of complexity is needed for the attack. The exploitation appears to be difficult. The exploit has been released to the public and may be exploited."},{"lang":"de","value":"In Langfuse bis 3.88.0 wurde eine Schwachstelle gefunden. Hierbei betrifft es die Funktion promptChangeEventSourcing der Datei web/src/features/prompts/server/routers/promptRouter.ts der Komponente Webhook Handler. Mit der Manipulation mit unbekannten Daten kann eine server-side request forgery-Schwachstelle ausgenutzt werden. Der Angriff lässt sich über das Netzwerk starten. Die Komplexität eines Angriffs ist eher hoch. Es wird angegeben, dass die Ausnutzbarkeit schwierig ist. Die Ausnutzung wurde veröffentlicht und kann verwendet werden."}],"metrics":[{"cvssV4_0":{"baseScore":2.3,"baseSeverity":"LOW","vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","version":"4.0"}},{"cvssV3_1":{"baseScore":5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","version":"3.1"}},{"cvssV3_0":{"baseScore":5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","version":"3.0"}},{"cvssV2_0":{"baseScore":4.6,"vectorString":"AV:N/AC:H/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR","version":"2.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-918","description":"Server-Side Request Forgery","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2025-09-01T22:02:09.356Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"name":"VDB-322114 | Langfuse Webhook promptRouter.ts promptChangeEventSourcing server-side request forgery","tags":["vdb-entry","technical-description"],"url":"https://vuldb.com/?id.322114"},{"name":"VDB-322114 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"],"url":"https://vuldb.com/?ctiid.322114"},{"name":"Submit #641128 | langfuse https://github.com/langfuse/langfuse  <=3.88.0 SSRF","tags":["third-party-advisory"],"url":"https://vuldb.com/?submit.641128"},{"tags":["issue-tracking"],"url":"https://github.com/langfuse/langfuse/issues/8522"},{"tags":["exploit","issue-tracking"],"url":"https://github.com/langfuse/langfuse/issues/8522#issue-3320549867"}],"timeline":[{"lang":"en","time":"2025-09-01T00:00:00.000Z","value":"Advisory disclosed"},{"lang":"en","time":"2025-09-01T02:00:00.000Z","value":"VulDB entry created"},{"lang":"en","time":"2025-09-01T14:29:18.000Z","value":"VulDB entry last update"}],"title":"Langfuse Webhook promptRouter.ts promptChangeEventSourcing server-side request forgery"}},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2025-9799","datePublished":"2025-09-01T22:02:09.356Z","dateReserved":"2025-09-01T12:23:02.536Z","dateUpdated":"2025-09-02T20:10:18.439Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2025-09-01 22:15:31","lastModifiedDate":"2026-04-29 01:00:01","problem_types":["CWE-918","CWE-918 Server-Side Request Forgery"],"metrics":{"cvssMetricV40":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":1.3,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L","baseScore":5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":1.6,"impactScore":3.4}],"cvssMetricV2":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:S/C:P/I:P/A:P","baseScore":4.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:langfuse:langfuse:*:*:*:*:*:*:*:*","versionEndIncluding":"3.88.0","matchCriteriaId":"F5561CC2-09A8-4C6D-84CD-E804A8FBFED7"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2025","CveId":"9799","Ordinal":"1","Title":"Langfuse Webhook promptRouter.ts promptChangeEventSourcing serve","CVE":"CVE-2025-9799","Year":"2025"},"notes":[{"CveYear":"2025","CveId":"9799","Ordinal":"1","NoteData":"A security flaw has been discovered in Langfuse up to 3.88.0. Affected by this vulnerability is the function promptChangeEventSourcing of the file web/src/features/prompts/server/routers/promptRouter.ts of the component Webhook Handler. Performing manipulation results in server-side request forgery. The attack may be initiated remotely. A high degree of complexity is needed for the attack. The exploitation appears to be difficult. The exploit has been released to the public and may be exploited.","Type":"Description","Title":"Langfuse Webhook promptRouter.ts promptChangeEventSourcing serve"}]}}}