Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-j62c-4x62-9r35: SvelteKit is vulnerable to denial of service and possible SSRF when using prerendering

Summary

Versions of SvelteKit are vulnerable to a server side request forgery (SSRF) and denial of service (DoS) under certain conditions.

Details

Affected versions from 2.44.0 onwards are vulnerable to DoS if:

  • your app has at least one prerendered route (export const prerender = true)

Affected versions from 2.19.0 onwards are vulnerable to DoS and SSRF if:

  • your app has at least one prerendered route (export const prerender = true)
  • AND you are using adapter-node without a configured ORIGIN environment variable, and you are not using a reverse proxy that implements Host header validation

Impact

The DoS causes the running server process to end.

The SSRF allows access to internal services that can be reached without authentication when fetched from SvelteKit’s server runtime.

It is also possible to obtain an SXSS via cache poisoning, by forcing a potential CDN to cache an XSS returned by the attacker’s server (the latter being able to specify the cache-control of their choice).

Credits

ghsa
#xss#web#dos#nodejs#js#git#ssrf#auth
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2025-67647

SvelteKit is vulnerable to denial of service and possible SSRF when using prerendering

High severity GitHub Reviewed Published Jan 15, 2026 in sveltejs/kit • Updated Jan 15, 2026

Package

npm @sveltejs/adapter-node (npm)

Affected versions

>= 5.4.1, <= 5.5.0

Summary

Versions of SvelteKit are vulnerable to a server side request forgery (SSRF) and denial of service (DoS) under certain conditions.

Details

Affected versions from 2.44.0 onwards are vulnerable to DoS if:

  • your app has at least one prerendered route (export const prerender = true)

Affected versions from 2.19.0 onwards are vulnerable to DoS and SSRF if:

  • your app has at least one prerendered route (export const prerender = true)
  • AND you are using adapter-node without a configured ORIGIN environment variable, and you are not using a reverse proxy that implements Host header validation

Impact

The DoS causes the running server process to end.

The SSRF allows access to internal services that can be reached without authentication when fetched from SvelteKit’s server runtime.

It is also possible to obtain an SXSS via cache poisoning, by forcing a potential CDN to cache an XSS returned by the attacker’s server (the latter being able to specify the cache-control of their choice).

Credits

  • Allam Rachid (zhero;)
  • Allam Yasser (inzo)
  • d-xuan (wednesday)

References

  • GHSA-j62c-4x62-9r35
  • sveltejs/kit@d9ae9b0
  • https://github.com/sveltejs/kit/releases/tag/%40sveltejs%2Fadapter-node%405.5.1
  • https://github.com/sveltejs/kit/releases/tag/%40sveltejs%2Fkit%402.49.5

Published to the GitHub Advisory Database

Jan 15, 2026

Last updated

Jan 15, 2026

ghsa: Latest News

GHSA-cwjm-3f7h-9hwq: Traefik's ACME TLS-ALPN fast path lacks timeouts and close on handshake stall