CVE-2025-57814 is a low severity vulnerability with a CVSS score of 0.0. No known exploits currently, and patches are available.
Very low probability of exploitation
EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.
request-filtering-agent versions 1.x.x and earlier contain a vulnerability where HTTPS requests to 127.0.0.1 bypass IP address filtering, while HTTP requests are correctly blocked.
Impact:
Vulnerable patterns (requests that should be blocked but are allowed):
https://127.0.0.1This vulnerability primarily affects services using self-signed certificates on 127.0.0.1.
Not affected (correctly blocked in all versions):
This allows attackers to potentially access internal HTTPS services running on localhost, bypassing the library's SSRF protection. The vulnerability is particularly dangerous when the application accepts user-controlled URLs and internal services are only protected by network-level restrictions.
This vulnerability has been fixed in request-filtering-agent version 2.0.0. Users should upgrade to version 2.0.0 or later.
Root Cause:The HTTPS agent fails to validate direct IP addresses like https://127.0.0.1 during TLS connection setup, allowing them to bypass the security filter.
Details: https://github.com/azu/request-filtering-agent-https127-test
Thanks Luca
Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.