CVE-2025-68157

Webpack is a module bundler. From version 5.49.0 to before 5.104.0, when experiments.buildHttp is enabled, webpack’s HTTP(S) resolver (HttpUriPlugin) enforces allowedUris only for the initial URL, but does not re-validate allowedUris after following HTTP 30x redirects. As a result, an import that appears restricted to a trusted allow-list can be redirected to HTTP(S) URLs outside the allow-list. This is a policy/allow-list bypass that enables build-time SSRF behavior (requests from the build machine to internal-only endpoints, depending on network access) and untrusted content inclusion in build outputs (redirected content is treated as module source and bundled). This issue has been patched in version 5.104.0.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:webpack.js:webpack:*:*:*:*:*:node.js:*:*

History

13 Feb 2026, 19:21

Type Values Removed Values Added
First Time Webpack.js webpack
Webpack.js
CPE cpe:2.3:a:webpack.js:webpack:*:*:*:*:*:node.js:*:*
References () https://github.com/webpack/webpack/security/advisories/GHSA-38r7-794h-5758 - () https://github.com/webpack/webpack/security/advisories/GHSA-38r7-794h-5758 - Exploit, Vendor Advisory

05 Feb 2026, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-05 23:15

Updated : 2026-02-13 19:21


NVD link : CVE-2025-68157

Mitre link : CVE-2025-68157

CVE.ORG link : CVE-2025-68157


JSON object : View

Products Affected

webpack.js

  • webpack
CWE
CWE-918

Server-Side Request Forgery (SSRF)