webpack buildHttp HttpUriPlugin allowedUris bypass via HTTP redirects
Description
Webpack is a module bundler. From version 5.49.0 to before 5.104.0, when experiments.buildHttp is enabled, webpack’s HTTP(S) resolver (HttpUriPlugin) enforces allowedUris only for the initial URL, but does not re-validate allowedUris after following HTTP 30x redirects. As a result, an import that appears restricted to a trusted allow-list can be redirected to HTTP(S) URLs outside the allow-list. This is a policy/allow-list bypass that enables build-time SSRF behavior (requests from the build machine to internal-only endpoints, depending on network access) and untrusted content inclusion in build outputs (redirected content is treated as module source and bundled). This issue has been patched in version 5.104.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
webpacknpm | >= 5.49.0, < 5.104.0 | 5.104.0 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-38r7-794h-5758ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-68157ghsaADVISORY
- github.com/webpack/webpack/security/advisories/GHSA-38r7-794h-5758ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.