CVE-2025-15104

Nu Html Checker SSRF: When 'Localhost' Isn't the Only Way Home

Alon Barad
Alon Barad
Software Engineer

Jan 18, 2026·6 min read·21 visits

Executive Summary (TL;DR)

The Nu Html Checker allows users to validate HTML via URL. It attempts to block internal access by banning hostnames like "localhost", but fails to validate the resolved IP address. Attackers can use DNS rebinding or domains resolving to loopback addresses to bypass this filter, tricking the server into connecting to its own internal services or local network infrastructure.

The Nu Html Checker (validator.nu), the engine powering W3C's HTML validation services, contains a Server-Side Request Forgery (SSRF) vulnerability. By relying on a flimsy hostname blocklist instead of robust IP validation, the application allows attackers to bypass protections via DNS rebinding and access internal network resources.

Fix Analysis (1)

Technical Appendix

CVSS Score
6.9/ 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N
EPSS Probability
0.06%
Top 80% most exploited

Affected Systems

Nu Html Checker (vnu)validator.nuW3C Validator implementations using vnu engine

Affected Versions Detail

Product
Affected Versions
Fixed Version
Nu Html Checker
validator.nu
< 23f090a (Jan 16 2026)Post-Jan 16 2026 builds
AttributeDetail
Vulnerability TypeSSRF (Server-Side Request Forgery)
CWE IDCWE-918
CVSS v4.06.9 (Medium)
Attack VectorNetwork
Attack ComplexityLow
Exploit StatusNo public PoC, but technique is standard
EPSS Score0.06%
CWE-918
Server-Side Request Forgery (SSRF)

The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.

Vulnerability Timeline

Vulnerability Disclosed by Fluid Attacks
2026-01-16
CVE-2025-15104 Assigned
2026-01-16

Subscribe to updates

Get the latest CVE analysis reports delivered to your inbox.