CVE-2025-67647
Summary
Versions of SvelteKit are vulnerable to a server side request forgery (SSRF) and denial of service (DoS) under certain conditions.
Details
Affected versions from 2.44.0 onwards are vulnerable to DoS if:
- your app has at least one prerendered route (
export const prerender = true)
Affected versions from 2.19.0 onwards are vulnerable to DoS and SSRF if:
- your app has at least one prerendered route (
export const prerender = true) - AND you are using
adapter-nodewithout a configuredORIGINenvironment variable, and you are not using a reverse proxy that implements Host header validation
Impact
The DoS causes the running server process to end.
The SSRF allows access to internal services that can be reached without authentication when fetched from SvelteKit's server runtime.
It is also possible to obtain an SXSS via cache poisoning, by forcing a potential CDN to cache an XSS returned by the attacker's server (the latter being able to specify the cache-control of their choice).
Credits
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/sveltejs/kit/security/advisories/GHSA-j62c-4x62-9r35, https://github.com/sveltejs/kit/commit/d9ae9b00b14f5574d109f3fd548f960594346226, https://github.com/sveltejs/kit, https://github.com/sveltejs/kit/releases/tag/%40sveltejs%2Fadapter-node%405.5.1, https://github.com/sveltejs/kit/releases/tag/%40sveltejs%2Fkit%402.49.5
