Headline
GHSA-j62c-4x62-9r35: SvelteKit is vulnerable to denial of service and possible SSRF when using prerendering
Summary
Versions of SvelteKit are vulnerable to a server side request forgery (SSRF) and denial of service (DoS) under certain conditions.
Details
Affected versions from 2.44.0 onwards are vulnerable to DoS if:
- your app has at least one prerendered route (
export const prerender = true)
Affected versions from 2.19.0 onwards are vulnerable to DoS and SSRF if:
- your app has at least one prerendered route (
export const prerender = true) - AND you are using
adapter-nodewithout a configuredORIGINenvironment variable, and you are not using a reverse proxy that implements Host header validation
Impact
The DoS causes the running server process to end.
The SSRF allows access to internal services that can be reached without authentication when fetched from SvelteKit’s server runtime.
It is also possible to obtain an SXSS via cache poisoning, by forcing a potential CDN to cache an XSS returned by the attacker’s server (the latter being able to specify the cache-control of their choice).
Credits
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2025-67647
SvelteKit is vulnerable to denial of service and possible SSRF when using prerendering
High severity GitHub Reviewed Published Jan 15, 2026 in sveltejs/kit • Updated Jan 15, 2026
Package
npm @sveltejs/adapter-node (npm)
Affected versions
>= 5.4.1, <= 5.5.0
Summary
Versions of SvelteKit are vulnerable to a server side request forgery (SSRF) and denial of service (DoS) under certain conditions.
Details
Affected versions from 2.44.0 onwards are vulnerable to DoS if:
- your app has at least one prerendered route (export const prerender = true)
Affected versions from 2.19.0 onwards are vulnerable to DoS and SSRF if:
- your app has at least one prerendered route (export const prerender = true)
- AND you are using adapter-node without a configured ORIGIN environment variable, and you are not using a reverse proxy that implements Host header validation
Impact
The DoS causes the running server process to end.
The SSRF allows access to internal services that can be reached without authentication when fetched from SvelteKit’s server runtime.
It is also possible to obtain an SXSS via cache poisoning, by forcing a potential CDN to cache an XSS returned by the attacker’s server (the latter being able to specify the cache-control of their choice).
Credits
- Allam Rachid (zhero;)
- Allam Yasser (inzo)
- d-xuan (wednesday)
References
- GHSA-j62c-4x62-9r35
- sveltejs/kit@d9ae9b0
- https://github.com/sveltejs/kit/releases/tag/%40sveltejs%2Fadapter-node%405.5.1
- https://github.com/sveltejs/kit/releases/tag/%40sveltejs%2Fkit%402.49.5
Published to the GitHub Advisory Database
Jan 15, 2026
Last updated
Jan 15, 2026