Fix GuideInput Validation

How to Fix CWE-918: Server-Side Request Forgery (SSRF)

Verified by Precogs Threat Research

The application makes HTTP requests based on user-supplied URLs without proper validation.

⚠️ Impact if Unpatched

Internal network scanning, cloud metadata theft (AWS/GCP credentials), access to internal services.

Step-by-Step Remediation

  1. Validate and sanitize all user-supplied URLs
  2. Implement URL allowlists for permitted destinations
  3. Block requests to private/internal IP ranges (10.x, 172.16.x, 192.168.x, 169.254.x)
  4. Disable unnecessary URL schemes (file://, gopher://, dict://)
  5. Use a dedicated egress proxy for outbound requests

Don't just patch one instance.

Scan your entire codebase for all instances of Server-Side Request Forgery (SSRF).

Scan for Free with Precogs AI →

Recent Vulnerabilities (CWE-918)

54 vulnerabilities in our database match Server-Side Request Forgery (SSRF).

View all 54 vulnerabilities →