A Server-Side Request Forgery (SSRF) in the /api/proxy/...
High severity
Unreviewed
Published
Nov 6, 2025
to the GitHub Advisory Database
•
Updated Nov 7, 2025
Description
Published by the National Vulnerability Database
Nov 6, 2025
Published to the GitHub Advisory Database
Nov 6, 2025
Last updated
Nov 7, 2025
A Server-Side Request Forgery (SSRF) in the /api/proxy/ component of linshenkx prompt-optimizer v1.3.0 to v1.4.2 allows attackers to scan internal resources via a crafted request.
References