CVE-2025-69206
JavaScript vulnerability analysis and mitigation

Hemmelig is a messing app with with client-side encryption and self-destructing messages. Prior to version 7.3.3, a Server-Side Request Forgery (SSRF) filter bypass vulnerability exists in the webhook URL validation of the Secret Requests feature. The application attempts to block internal/private IP addresses but can be bypassed using DNS rebinding or open redirect services. This allows an authenticated user to make the server initiate HTTP requests to internal network resources. Version 7.3.3 contains a patch for the issue.


SourceNVD

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-13158CRITICAL9.3
  • JavaScriptJavaScript
  • apidoc-core
NoNoDec 26, 2025
CVE-2025-68665HIGH8.6
  • JavaScriptJavaScript
  • @langchain/core
NoYesDec 23, 2025
CVE-2025-25341HIGH7.5
  • JavaScriptJavaScript
  • libxmljs
NoNoDec 26, 2025
CVE-2025-68475HIGH7.5
  • JavaScriptJavaScript
  • @fedify/fedify
NoYesDec 22, 2025
CVE-2025-69206MEDIUM4.3
  • JavaScriptJavaScript
  • hemmelig
NoYesDec 29, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management