Server-Side Request Forgery in Dragonfly by DragonflyOSS
CVE-2025-59346

5.5MEDIUM

Key Information:

Status
Vendor
CVE Published:
17 September 2025

What is CVE-2025-59346?

Dragonfly, an open-source P2P-based file distribution and image acceleration system, has a vulnerability that allows attackers to exploit its Manager API. This flaw arises from insufficient validation of user-supplied URLs when creating a Preheat job. Consequently, malicious peers can induce the system to issue requests to internal services that should remain inaccessible. The vulnerability stems from internal HTTP clients following redirects, which permits probing of internal HTTP endpoints via specially crafted requests. Users are encouraged to upgrade to version 2.1.0 or later to mitigate this issue.

Affected Version(s)

dragonfly < 2.1.0

References

CVSS V4

Score:
5.5
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.