{"id":"CVE-2022-25850","summary":"Server-side Request Forgery (SSRF)","details":"The package github.com/hoppscotch/proxyscotch before 1.0.0 are vulnerable to Server-side Request Forgery (SSRF) when interceptor mode is set to proxy. It occurs when an HTTP request is made by a backend server to an untrusted URL submitted by a user. It leads to a leakage of sensitive information from the server.","aliases":["GHSA-5hjh-c26m-xw8w","SNYK-GOLANG-GITHUBCOMHOPPSCOTCHPROXYSCOTCH-2435228"],"modified":"2026-05-19T11:55:49.500132298Z","published":"2022-05-01T15:20:09.959Z","database_specific":{"unresolved_ranges":[{"source":"AFFECTED_FIELD","extracted_events":[{"fixed":"1.0.0"}]},{"source":"DESCRIPTION","extracted_events":[{"fixed":"1.0.0"}]}],"cna_assigner":"snyk","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/25xxx/CVE-2022-25850.json"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/25xxx/CVE-2022-25850.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25850"},{"type":"ADVISORY","url":"https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMHOPPSCOTCHPROXYSCOTCH-2435228"},{"type":"FIX","url":"https://github.com/hoppscotch/proxyscotch/commit/de67380f62f907f201d75854b76024ba4885fab7"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/hoppscotch/proxyscotch","events":[{"introduced":"0"},{"fixed":"de67380f62f907f201d75854b76024ba4885fab7"}],"database_specific":{"source":"REFERENCES"}}],"versions":["v0.0.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-25850.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P"}]}