CVE-2025-59346
vulnerability analysis and mitigation

Overview

Dragonfly, an open source P2P-based file distribution and image acceleration system, disclosed a server-side request forgery (SSRF) vulnerability (CVE-2025-59346) affecting versions prior to 2.1.0. The vulnerability was discovered and reported on September 17, 2025, enabling attackers to force DragonFly2's components to make requests to internal services that should not be accessible to them (GitHub Advisory).

Technical details

The vulnerability stems from multiple attack vectors in the DragonFly2 system. The Manager API accepts user-supplied URLs for Preheat job creation with insufficient validation. Additionally, peers can trigger other peers to fetch arbitrary URLs through pieceManager.DownloadSource method, and internal HTTP clients follow redirects, allowing request redirection to internal services. The vulnerability has been assigned a CVSS v3.1 base score of 5.3 (Medium) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N (NVD).

Impact

The vulnerability allows attackers to probe or access internal HTTP endpoints that should otherwise be inaccessible. This can potentially lead to unauthorized access to internal services and exposure of sensitive information within the organization's network (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in Dragonfly version 2.1.0. There are no effective workarounds available besides upgrading to the patched version (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management