CVE-2025-9799

5.0 MEDIUM

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in Langfuse's webhook handler. Attackers can manipulate the promptChangeEventSourcing function to make the server send unauthorized requests to internal systems. Organizations using Langfuse up to version 3.88.0 are affected.

💻 Affected Systems

Products:
  • Langfuse
Versions: Up to and including 3.88.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with webhook functionality enabled and accessible to attackers.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, exfiltrate sensitive data, or pivot to other systems within the network.

🟠

Likely Case

Limited data exposure from internal services accessible to the Langfuse server, potentially including metadata or configuration information.

🟢

If Mitigated

With proper network segmentation and egress filtering, impact is limited to services the Langfuse server can already access.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit details are publicly available but require specific conditions and knowledge of the target environment.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.89.0 or later

Vendor Advisory: https://github.com/langfuse/langfuse/issues/8522

Restart Required: No

Instructions:

1. Update Langfuse to version 3.89.0 or later. 2. Verify the update completed successfully. 3. Test webhook functionality.

🔧 Temporary Workarounds

Restrict Webhook Access

all

Limit access to the webhook endpoint using network controls or authentication.

Implement Egress Filtering

all

Restrict outbound connections from the Langfuse server to only necessary destinations.

🧯 If You Can't Patch

  • Isolate the Langfuse server in a restricted network segment with limited outbound access.
  • Implement strict input validation and URL sanitization for webhook parameters.

🔍 How to Verify

Check if Vulnerable:

Check Langfuse version: if version <= 3.88.0, system is vulnerable.

Check Version:

Check Langfuse dashboard or deployment configuration for version number.

Verify Fix Applied:

Confirm Langfuse version is 3.89.0 or higher and test webhook functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from Langfuse server to internal IPs
  • Webhook requests with unusual URL parameters

Network Indicators:

  • HTTP requests from Langfuse server to unexpected internal destinations
  • Patterns of requests to metadata services (169.254.169.254, etc.)

SIEM Query:

source="langfuse" AND (dest_ip IN internal_range OR dest_ip=169.254.169.254)

🔗 References

📤 Share & Export