PYSEC-2025-16
Vulnerability from pysec - Published: 2025-04-06 20:15 - Updated: 2025-04-09 17:27
VLAI?
Details
LNbits is a Lightning wallet and accounts system. A Server-Side Request Forgery (SSRF) vulnerability has been discovered in LNbits' LNURL authentication handling functionality. When processing LNURL authentication requests, the application accepts a callback URL parameter and makes an HTTP request to that URL using the httpx library with redirect following enabled. The application doesn't properly validate the callback URL, allowing attackers to specify internal network addresses and access internal resources.
Severity ?
7.5 (High)
Impacted products
| Name | purl | lnbits | pkg:pypi/lnbits |
|---|
Aliases
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "lnbits",
"purl": "pkg:pypi/lnbits"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.12.12"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"0.10.3.dev1",
"0.12.10",
"0.12.11",
"0.12.12rc1",
"0.12.6",
"0.12.7",
"0.12.8",
"0.12.9"
]
}
],
"aliases": [
"CVE-2025-32013"
],
"details": "LNbits is a Lightning wallet and accounts system. A Server-Side Request Forgery (SSRF) vulnerability has been discovered in LNbits\u0027 LNURL authentication handling functionality. When processing LNURL authentication requests, the application accepts a callback URL parameter and makes an HTTP request to that URL using the httpx library with redirect following enabled. The application doesn\u0027t properly validate the callback URL, allowing attackers to specify internal network addresses and access internal resources.",
"id": "PYSEC-2025-16",
"modified": "2025-04-09T17:27:25.872691+00:00",
"published": "2025-04-06T20:15:15+00:00",
"references": [
{
"type": "EVIDENCE",
"url": "https://github.com/lnbits/lnbits/security/advisories/GHSA-qp8j-p87f-c8cc"
}
],
"related": [
"GHSA-qp8j-p87f-c8cc",
"GHSA-qp8j-p87f-c8cc"
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…