CVE-2025-59436
Linux Debian vulnerability analysis and mitigation

Overview

The CVE-2025-59436 affects the ip (aka node-ip) package through version 2.0.1 in NPM. This vulnerability is related to an improper categorization of IP addresses that could lead to Server-Side Request Forgery (SSRF) attacks. Specifically, the IP address value '017700000001' is incorrectly classified as globally routable via the isPublic function. This vulnerability exists as a result of an incomplete fix for a previous vulnerability (CVE-2024-29415) (NVD, Debian).

Technical details

The vulnerability stems from inadequate input validation and IP address normalization in the IP parsing logic. The affected functions (ip.isPublic and ip.isPrivate) fail to properly normalize IP addresses before validation and handle special cases like null route (0) and octal formats (017700000001). The vulnerability has been assigned a CVSS 3.1 Base Score of 3.2 (Low) with the vector string CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N, indicating a local attack vector with high attack complexity (CVE Application, Ubuntu).

Impact

The vulnerability can lead to Server-Side Request Forgery (SSRF) attacks by allowing attackers to bypass IP-based SSRF protections. This could result in unauthorized access to internal services and APIs, potential data exfiltration, and service enumeration capabilities. The package has a significant installation base with over 5 million weekly NPM downloads and is used in thousands of Node.js applications, particularly in enterprise web applications implementing SSRF protection (CVE Application).

Mitigation and workarounds

For immediate mitigation, it is recommended to implement enhanced validation functions that specifically handle bypass techniques. The suggested approach includes checking for null routes, addresses starting with '127.', and octal format patterns. Long-term fixes should focus on proper input normalization, comprehensive validation including all possible IP address representations, and special case handling for null routes and octal formats (CVE Application).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22857MEDIUM6.8
  • Linux DebianLinux Debian
  • freerdp-plugins
NoNoJan 14, 2026
CVE-2026-22856MEDIUM6.8
  • Linux DebianLinux Debian
  • freerdp2
NoNoJan 14, 2026
CVE-2026-22859MEDIUM5.6
  • Linux DebianLinux Debian
  • freerdp3
NoNoJan 14, 2026
CVE-2026-22858MEDIUM5.6
  • Linux DebianLinux Debian
  • freerdp3
NoNoJan 14, 2026
CVE-2026-22036LOW3.7
  • JavaScriptJavaScript
  • node-undici
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management