CVE-2025-60540

6.5 MEDIUM

📋 TL;DR

karakeep versions v0.26.0 to v0.7.0 contain a Server-Side Request Forgery (SSRF) vulnerability that allows attackers to make unauthorized requests from the server to internal or external systems. This affects all deployments running vulnerable versions of karakeep, potentially exposing internal network resources or enabling data exfiltration.

💻 Affected Systems

Products:
  • karakeep
Versions: v0.26.0 to v0.7.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments within the affected version range are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker accesses internal services, exfiltrates sensitive data, or performs lateral movement within the network by making the vulnerable server proxy requests to internal systems.

🟠

Likely Case

Information disclosure from internal services, scanning of internal network resources, or limited data exfiltration through the vulnerable server.

🟢

If Mitigated

Limited impact with proper network segmentation and egress filtering, potentially only allowing requests to specific allowed endpoints.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of the vulnerable endpoint and ability to craft SSRF payloads.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v0.26.1 or later

Vendor Advisory: https://github.com/karakeep-app/karakeep/

Restart Required: No

Instructions:

1. Update karakeep to version v0.26.1 or later. 2. Verify the update was successful by checking the version. 3. No restart required for typical deployments.

🔧 Temporary Workarounds

Network Egress Filtering

all

Implement network-level restrictions to limit outbound connections from the karakeep server to only necessary external services.

Input Validation

all

Add input validation to reject URLs pointing to internal IP ranges (127.0.0.1, 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16) and localhost.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the karakeep server from sensitive internal systems
  • Deploy a web application firewall (WAF) with SSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Check karakeep version. If between v0.26.0 and v0.7.0 inclusive, the system is vulnerable.

Check Version:

karakeep --version

Verify Fix Applied:

Verify karakeep version is v0.26.1 or later and test the previously vulnerable endpoint with SSRF payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from karakeep server
  • Requests to internal IP addresses or localhost from karakeep

Network Indicators:

  • Unexpected HTTP traffic from karakeep server to internal network segments
  • Multiple rapid requests to different internal IPs

SIEM Query:

source="karakeep" AND (dest_ip=127.0.0.1 OR dest_ip IN (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16))

🔗 References

📤 Share & Export