esm.sh is a no-build content delivery network (CDN) for web development. In version 136, esm.sh is vulnerable to a full-response SSRF, allowing an attacker to retrieve information from internal websites through the vulnerability. Version 137 fixes the vulnerability.
References
| Link | Resource |
|---|---|
| https://github.com/esm-dev/esm.sh/blob/f80ff8c8d58749e77fa964abde468fc61f8bd89e/internal/fetch/fetch.go#L13 | Patch |
| https://github.com/esm-dev/esm.sh/blob/f80ff8c8d58749e77fa964abde468fc61f8bd89e/server/router.go#L511 | Patch |
| https://github.com/esm-dev/esm.sh/commit/0593516c4cfab49ad3b4900416a8432ff2e23eb0 | Patch |
| https://github.com/esm-dev/esm.sh/pull/1149 | Issue Tracking Patch |
| https://github.com/esm-dev/esm.sh/releases/tag/v137 | Product Release Notes |
| https://github.com/esm-dev/esm.sh/security/advisories/GHSA-3c9r-837r-qqm4 | Exploit Mitigation Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-02-25 16:23
Updated : 2026-02-27 17:44
NVD link : CVE-2025-50180
Mitre link : CVE-2025-50180
CVE.ORG link : CVE-2025-50180
JSON object : View
Products Affected
esm
- esm.sh
CWE
CWE-918
Server-Side Request Forgery (SSRF)
