CVE ReportsThe Proxy that Talked Too Much: Breaking esm.sh with SSRF Vulnerability ID:...
Vulnerability ID: CVE-2026-27730
CVSS Score: 8.6
Published: 2026-02-25
A critical Server-Side Request Forgery (SSRF) vulnerability in esm.sh allowed attackers to bypass string-based hostname validation using DNS aliases. By masking internal IP addresses behind innocent-looking domain names, attackers could trick the CDN into scanning local networks or retrieving cloud metadata. While a patch attempted to pin hosts during redirects, the fundamental flaw of validating hostnames before DNS resolution remains a classic example of 'checking the ID card but ignoring the face'.
Critical SSRF in esm.sh allows internal network access via DNS aliasing. The application validated URL strings instead of resolved IPs, enabling attackers to bypass 'localhost' blocks using domains like '127.0.0.1.nip.io'.
137)fix: prevent ssrf redirect
Client.CheckRedirect = func(req *http.Request, via []*http.Request) error { ... }
Remediation Steps:
Read the full report for CVE-2026-27730 on our website for more details including interactive diagrams and full exploit analysis.