Vulnerability Description
SvelteKit is a framework for rapidly developing robust, performant web applications using Svelte. Prior to 2.49.5, SvelteKit is vulnerable to a server side request forgery (SSRF) and denial of service (DoS) under certain conditions. From 2.44.0 through 2.49.4, the vulnerability results in a DoS when your app has at least one prerendered route (export const prerender = true). From 2.19.0 through 2.49.4, the vulnerability results in a DoS when your app has at least one prerendered route and you are using adapter-node without a configured ORIGIN environment variable, and you are not using a reverse proxy that implements Host header validation. This vulnerability is fixed in 2.49.5.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Svelte | Adapter-Node | >= 5.4.1, < 5.5.1 |
| Svelte | Kit | >= 2.19.0, < 2.49.5 |
Related Weaknesses (CWE)
References
- https://github.com/sveltejs/kit/commit/d9ae9b00b14f5574d109f3fd548f960594346226Patch
- https://github.com/sveltejs/kit/security/advisories/GHSA-j62c-4x62-9r35Vendor Advisory
FAQ
What is CVE-2025-67647?
CVE-2025-67647 is a vulnerability with a CVSS score of 9.1 (CRITICAL). SvelteKit is a framework for rapidly developing robust, performant web applications using Svelte. Prior to 2.49.5, SvelteKit is vulnerable to a server side request forgery (SSRF) and denial of service...
How severe is CVE-2025-67647?
CVE-2025-67647 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-67647?
Check the references section above for vendor advisories and patch information. Affected products include: Svelte Adapter-Node, Svelte Kit.