- Description
- WeasyPrint helps web developers to create PDF documents. Prior to version 68.0, a server-side request forgery (SSRF) protection bypass exists in WeasyPrint's `default_url_fetcher`. The vulnerability allows attackers to access internal network resources (such as `localhost` services or cloud metadata endpoints) even when a developer has implemented a custom `url_fetcher` to block such access. This occurs because the underlying `urllib` library follows HTTP redirects automatically without re-validating the new destination against the developer's security policy. Version 68.0 contains a patch for the issue.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
- Products
- weasyprint
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
- Hype score
- Not currently trending
CVE-2025-68616 Server-Side Request Forgery Bypass in WeasyPrint URL Fetcher Befo... https://t.co/FyvVFTc1Gs Vulnerability Alert Subscriptions: https://t.co/hrQhy5uz4x
@VulmonFeeds
19 Jan 2026
26 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-68616 WeasyPrint helps web developers to create PDF documents. Prior to version 68.0, a server-side request forgery (SSRF) protection bypass exists in WeasyPrint's `default… https://t.co/s048jiiMsV
@CVEnew
19 Jan 2026
140 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kozea:weasyprint:*:*:*:*:*:*:*:*",
"matchCriteriaId": "42F666F8-3ABE-4CAB-BAE5-99C8268DC002",
"versionEndExcluding": "68.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]