Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/node-undici@5.8.2%2Bdfsg1%2B~cs18.9.18.1-1?distro=trixie
Typedeb
Namespacedebian
Namenode-undici
Version5.8.2+dfsg1+~cs18.9.18.1-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version5.15.0+dfsg1+~cs20.10.9.3-1+deb12u1
Latest_non_vulnerable_version7.24.6+dfsg+~cs3.2.0-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-g4wu-n75v-p7ad
vulnerability_id VCID-g4wu-n75v-p7ad
summary
`undici.request` vulnerable to SSRF using absolute URL on `pathname`
### Impact

`undici` is vulnerable to SSRF (Server-side Request Forgery) when an application takes in **user input** into the `path/pathname` option of `undici.request`.

If a user specifies a URL such as `http://127.0.0.1` or `//127.0.0.1`

```js
const undici = require("undici")
undici.request({origin: "http://example.com", pathname: "//127.0.0.1"})
```

Instead of processing the request as `http://example.org//127.0.0.1` (or `http://example.org/http://127.0.0.1` when `http://127.0.0.1 is used`), it actually processes the request as `http://127.0.0.1/` and sends it to `http://127.0.0.1`.

If a developer passes in user input into `path` parameter of `undici.request`, it can result in an _SSRF_ as they will assume that the hostname cannot change, when in actual fact it can change because the specified path parameter is combined with the base URL.

### Patches

This issue was fixed in `undici@5.8.1`.

### Workarounds

The best workaround is to validate user input before passing it to the `undici.request` call.

## For more information
If you have any questions or comments about this advisory:

- Open an issue in [undici repository](https://github.com/nodejs/undici/issues)
- To make a report, follow the [SECURITY](https://github.com/nodejs/node/blob/HEAD/SECURITY.md) document
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35949.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35949.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-35949
reference_id
reference_type
scores
0
value 0.0039
scoring_system epss
scoring_elements 0.60075
published_at 2026-04-21T12:55:00Z
1
value 0.0039
scoring_system epss
scoring_elements 0.59997
published_at 2026-04-02T12:55:00Z
2
value 0.0039
scoring_system epss
scoring_elements 0.60022
published_at 2026-04-04T12:55:00Z
3
value 0.0039
scoring_system epss
scoring_elements 0.59992
published_at 2026-04-07T12:55:00Z
4
value 0.0039
scoring_system epss
scoring_elements 0.60042
published_at 2026-04-08T12:55:00Z
5
value 0.0039
scoring_system epss
scoring_elements 0.60056
published_at 2026-04-09T12:55:00Z
6
value 0.0039
scoring_system epss
scoring_elements 0.60077
published_at 2026-04-11T12:55:00Z
7
value 0.0039
scoring_system epss
scoring_elements 0.60061
published_at 2026-04-12T12:55:00Z
8
value 0.0039
scoring_system epss
scoring_elements 0.60044
published_at 2026-04-13T12:55:00Z
9
value 0.0039
scoring_system epss
scoring_elements 0.60083
published_at 2026-04-16T12:55:00Z
10
value 0.0039
scoring_system epss
scoring_elements 0.6009
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-35949
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
4
reference_url https://github.com/nodejs/undici/commit/124f7ebf705366b2e1844dff721928d270f87895
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:39:52Z/
url https://github.com/nodejs/undici/commit/124f7ebf705366b2e1844dff721928d270f87895
5
reference_url https://github.com/nodejs/undici/releases/tag/v5.8.2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:39:52Z/
url https://github.com/nodejs/undici/releases/tag/v5.8.2
6
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-8qr4-xgw6-wmr3
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:39:52Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-8qr4-xgw6-wmr3
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-35949
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-35949
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2121068
reference_id 2121068
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2121068
9
reference_url https://github.com/advisories/GHSA-8qr4-xgw6-wmr3
reference_id GHSA-8qr4-xgw6-wmr3
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8qr4-xgw6-wmr3
10
reference_url https://security.gentoo.org/glsa/202405-29
reference_id GLSA-202405-29
reference_type
scores
url https://security.gentoo.org/glsa/202405-29
fixed_packages
0
url pkg:deb/debian/node-undici@5.8.2%2Bdfsg1%2B~cs18.9.18.1-1?distro=trixie
purl pkg:deb/debian/node-undici@5.8.2%2Bdfsg1%2B~cs18.9.18.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@5.8.2%252Bdfsg1%252B~cs18.9.18.1-1%3Fdistro=trixie
1
url pkg:deb/debian/node-undici@5.15.0%2Bdfsg1%2B~cs20.10.9.3-1%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/node-undici@5.15.0%2Bdfsg1%2B~cs20.10.9.3-1%2Bdeb12u4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-g9bm-61bn-ryg5
2
vulnerability VCID-hgd1-7u6j-p7dh
3
vulnerability VCID-n6ew-t7g1-33gn
4
vulnerability VCID-pah5-gspe-hbbh
5
vulnerability VCID-ph2p-u33d-8yh3
6
vulnerability VCID-sy2z-sqgk-d7hg
7
vulnerability VCID-u8t3-4awy-k3fm
8
vulnerability VCID-xx5u-7mmp-akfs
9
vulnerability VCID-z653-vqsc-euer
10
vulnerability VCID-z7ac-jr58-gkfm
11
vulnerability VCID-zb3h-efqz-dff3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@5.15.0%252Bdfsg1%252B~cs20.10.9.3-1%252Bdeb12u4%3Fdistro=trixie
2
url pkg:deb/debian/node-undici@7.3.0%2Bdfsg1%2B~cs24.12.11-1?distro=trixie
purl pkg:deb/debian/node-undici@7.3.0%2Bdfsg1%2B~cs24.12.11-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-g9bm-61bn-ryg5
2
vulnerability VCID-hgd1-7u6j-p7dh
3
vulnerability VCID-n6ew-t7g1-33gn
4
vulnerability VCID-ph2p-u33d-8yh3
5
vulnerability VCID-sy2z-sqgk-d7hg
6
vulnerability VCID-vdca-exd1-rfce
7
vulnerability VCID-z7ac-jr58-gkfm
8
vulnerability VCID-zb3h-efqz-dff3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@7.3.0%252Bdfsg1%252B~cs24.12.11-1%3Fdistro=trixie
3
url pkg:deb/debian/node-undici@7.18.2%2Bdfsg%2B~cs3.2.0-1?distro=trixie
purl pkg:deb/debian/node-undici@7.18.2%2Bdfsg%2B~cs3.2.0-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-hgd1-7u6j-p7dh
2
vulnerability VCID-n6ew-t7g1-33gn
3
vulnerability VCID-ph2p-u33d-8yh3
4
vulnerability VCID-sy2z-sqgk-d7hg
5
vulnerability VCID-vdca-exd1-rfce
6
vulnerability VCID-z7ac-jr58-gkfm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@7.18.2%252Bdfsg%252B~cs3.2.0-1%3Fdistro=trixie
4
url pkg:deb/debian/node-undici@7.24.6%2Bdfsg%2B~cs3.2.0-2?distro=trixie
purl pkg:deb/debian/node-undici@7.24.6%2Bdfsg%2B~cs3.2.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@7.24.6%252Bdfsg%252B~cs3.2.0-2%3Fdistro=trixie
aliases CVE-2022-35949, GHSA-8qr4-xgw6-wmr3
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g4wu-n75v-p7ad
1
url VCID-rskk-s95c-rfgz
vulnerability_id VCID-rskk-s95c-rfgz
summary
Nodejs ‘undici’ vulnerable to CRLF Injection via Content-Type
### Impact

`=< undici@5.8.0` users are vulnerable to _CRLF Injection_ on headers when using unsanitized input as request headers, more specifically, inside the `content-type` header.

Example:

```
import { request } from 'undici'

const unsanitizedContentTypeInput =  'application/json\r\n\r\nGET /foo2 HTTP/1.1'

await request('http://localhost:3000, {
    method: 'GET',
    headers: {
      'content-type': unsanitizedContentTypeInput
    },
})
```

The above snippet will perform two requests in a single `request` API call:

1) `http://localhost:3000/`
2) `http://localhost:3000/foo2`

### Patches

This issue was patched in Undici v5.8.1

### Workarounds

Sanitize input when sending content-type headers using user input.

## For more information
If you have any questions or comments about this advisory:

- Open an issue in [undici repository](https://github.com/nodejs/undici/issues)
- To make a report, follow the [SECURITY](https://github.com/nodejs/node/blob/HEAD/SECURITY.md) document
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35948.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35948.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-35948
reference_id
reference_type
scores
0
value 0.00165
scoring_system epss
scoring_elements 0.37395
published_at 2026-04-21T12:55:00Z
1
value 0.00165
scoring_system epss
scoring_elements 0.3745
published_at 2026-04-18T12:55:00Z
2
value 0.00165
scoring_system epss
scoring_elements 0.37421
published_at 2026-04-13T12:55:00Z
3
value 0.00165
scoring_system epss
scoring_elements 0.37448
published_at 2026-04-12T12:55:00Z
4
value 0.00165
scoring_system epss
scoring_elements 0.37552
published_at 2026-04-02T12:55:00Z
5
value 0.00165
scoring_system epss
scoring_elements 0.37468
published_at 2026-04-16T12:55:00Z
6
value 0.00165
scoring_system epss
scoring_elements 0.37455
published_at 2026-04-08T12:55:00Z
7
value 0.00165
scoring_system epss
scoring_elements 0.37404
published_at 2026-04-07T12:55:00Z
8
value 0.00165
scoring_system epss
scoring_elements 0.37576
published_at 2026-04-04T12:55:00Z
9
value 0.00165
scoring_system epss
scoring_elements 0.37482
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-35948
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
4
reference_url https://github.com/nodejs/undici/commit/66165d604fd0aee70a93ed5c44ad4cc2df395f80
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:39:48Z/
url https://github.com/nodejs/undici/commit/66165d604fd0aee70a93ed5c44ad4cc2df395f80
5
reference_url https://github.com/nodejs/undici/releases/tag/v5.8.2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:39:48Z/
url https://github.com/nodejs/undici/releases/tag/v5.8.2
6
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-f772-66g8-q5h3
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:39:48Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-f772-66g8-q5h3
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-35948
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-35948
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2121101
reference_id 2121101
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2121101
9
reference_url https://github.com/advisories/GHSA-f772-66g8-q5h3
reference_id GHSA-f772-66g8-q5h3
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-f772-66g8-q5h3
10
reference_url https://security.gentoo.org/glsa/202405-29
reference_id GLSA-202405-29
reference_type
scores
url https://security.gentoo.org/glsa/202405-29
fixed_packages
0
url pkg:deb/debian/node-undici@5.8.2%2Bdfsg1%2B~cs18.9.18.1-1?distro=trixie
purl pkg:deb/debian/node-undici@5.8.2%2Bdfsg1%2B~cs18.9.18.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@5.8.2%252Bdfsg1%252B~cs18.9.18.1-1%3Fdistro=trixie
1
url pkg:deb/debian/node-undici@5.15.0%2Bdfsg1%2B~cs20.10.9.3-1%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/node-undici@5.15.0%2Bdfsg1%2B~cs20.10.9.3-1%2Bdeb12u4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-g9bm-61bn-ryg5
2
vulnerability VCID-hgd1-7u6j-p7dh
3
vulnerability VCID-n6ew-t7g1-33gn
4
vulnerability VCID-pah5-gspe-hbbh
5
vulnerability VCID-ph2p-u33d-8yh3
6
vulnerability VCID-sy2z-sqgk-d7hg
7
vulnerability VCID-u8t3-4awy-k3fm
8
vulnerability VCID-xx5u-7mmp-akfs
9
vulnerability VCID-z653-vqsc-euer
10
vulnerability VCID-z7ac-jr58-gkfm
11
vulnerability VCID-zb3h-efqz-dff3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@5.15.0%252Bdfsg1%252B~cs20.10.9.3-1%252Bdeb12u4%3Fdistro=trixie
2
url pkg:deb/debian/node-undici@7.3.0%2Bdfsg1%2B~cs24.12.11-1?distro=trixie
purl pkg:deb/debian/node-undici@7.3.0%2Bdfsg1%2B~cs24.12.11-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-g9bm-61bn-ryg5
2
vulnerability VCID-hgd1-7u6j-p7dh
3
vulnerability VCID-n6ew-t7g1-33gn
4
vulnerability VCID-ph2p-u33d-8yh3
5
vulnerability VCID-sy2z-sqgk-d7hg
6
vulnerability VCID-vdca-exd1-rfce
7
vulnerability VCID-z7ac-jr58-gkfm
8
vulnerability VCID-zb3h-efqz-dff3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@7.3.0%252Bdfsg1%252B~cs24.12.11-1%3Fdistro=trixie
3
url pkg:deb/debian/node-undici@7.18.2%2Bdfsg%2B~cs3.2.0-1?distro=trixie
purl pkg:deb/debian/node-undici@7.18.2%2Bdfsg%2B~cs3.2.0-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-hgd1-7u6j-p7dh
2
vulnerability VCID-n6ew-t7g1-33gn
3
vulnerability VCID-ph2p-u33d-8yh3
4
vulnerability VCID-sy2z-sqgk-d7hg
5
vulnerability VCID-vdca-exd1-rfce
6
vulnerability VCID-z7ac-jr58-gkfm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@7.18.2%252Bdfsg%252B~cs3.2.0-1%3Fdistro=trixie
4
url pkg:deb/debian/node-undici@7.24.6%2Bdfsg%2B~cs3.2.0-2?distro=trixie
purl pkg:deb/debian/node-undici@7.24.6%2Bdfsg%2B~cs3.2.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@7.24.6%252Bdfsg%252B~cs3.2.0-2%3Fdistro=trixie
aliases CVE-2022-35948, GHSA-f772-66g8-q5h3
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rskk-s95c-rfgz
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@5.8.2%252Bdfsg1%252B~cs18.9.18.1-1%3Fdistro=trixie