Apache EventMesh Vulnerable to Server-Side Request Forgery in WebhookUtil.java
Moderate severity
GitHub Reviewed
Published
Aug 20, 2025
to the GitHub Advisory Database
•
Updated Aug 20, 2025
Package
Affected versions
>= 1.6.0-release, <= 1.11.0-release
Patched versions
None
Description
Published by the National Vulnerability Database
Aug 20, 2025
Published to the GitHub Advisory Database
Aug 20, 2025
Reviewed
Aug 20, 2025
Last updated
Aug 20, 2025
Server-Side Request Forgery (SSRF) in eventmesh-runtime module in WebhookUtil.java on windows\linux\mac os e.g. allows the attacker can abuse functionality on the server to read or update internal resources.
Users are recommended to upgrade to version 1.12.0 or use the master branch, which fixes this issue.
References