Description
nuxt/icon provides an API to allow client side icon lookup. This endpoint is at /api/_nuxt_icon/[name].
The proxied request path is improperly parsed, allowing an attacker to change the scheme and host of the request. This leads to SSRF, and could potentially lead to sensitive data exposure.
Recommendation
Update the @nuxt/icon package to the latest compatible version. Followings are version details:
- Affected version(s): <= 1.4.4
- Patched version(s): 1.4.5
References
Related Issues
- Strapi Server-Side Request Forgery (SSRF) - CVE-2024-37818
- google-translate-api-browser Server-Side Request Forgery (SSRF) Vulnerability - CVE-2023-48711
- Payload: Server-Side Request Forgery (SSRF) in External File URL Uploads - CVE-2026-27567
- HackMD MCP Server has Server-Side Request Forgery (SSRF) vulnerability - CVE-2025-59155
- Tags:
- npm
- @nuxt/icon
Anything's wrong? Let us know Last updated on August 06, 2024