What is an SSRF vulnerability?
1 min read
Updated 2026-02-05
Server-Side Request Forgery. A vulnerability where an attacker can make the server perform requests to unintended locations, potentially accessing internal resources.
Understanding SSRF
SSRF exploits server functionality that fetches external resources. Attackers can use it to scan internal networks, access cloud metadata services (like AWS IMDSv1), or interact with internal services. It's particularly dangerous in cloud environments.
Examples
- Accessing AWS metadata at http://169.254.169.254
- Scanning internal network ports
- Accessing internal admin panels
- Reading local files via file:// protocol
How to Prevent
- Validate and sanitize all user-supplied URLs
- Use allowlists for permitted domains
- Block requests to private IP ranges
- Disable unnecessary URL schemes (file://, gopher://)
- Use AWS IMDSv2 which requires a token
Worried about SSRF in your app?
Our security audits identify vulnerabilities like this before attackers do. Get expert manual review of your codebase.