NocoBase's workflow HTTP request plugin and custom request action plugin make server-side HTTP requests to user-provided URLs without any SSRF protection. An authenticated user can access internal network services, cloud metadata endpoints, and localhost.
packages/plugins/@nocobase/plugin-workflow-request/src/server/RequestInstruction.ts lines 117-128:
return axios.request({
url: trim(url), // User-controlled, no validation
method,
headers,
params,
timeout,
...(method.toLowerCase() !== 'get' && data != null
? { data: transformer ? await transformer(data) : data }
: {}),
});
The url at line 98 comes directly from user workflow configuration with only whitespace trimming.
packages/plugins/@nocobase/plugin-action-custom-request/src/server/actions/send.ts lines 172-198:
const axiosRequestConfig = {
baseURL: ctx.origin,
...options,
url: getParsedValue(url, variables), // User-controlled via template
headers: { ... },
params: getParsedValue(arrayToObject(params), variables),
data: getParsedValue(toJSON(data), variables),
};
const res = await axios(axiosRequestConfig); // No IP validation
request-filtering-agent or SSRF library (confirmed via grep across entire codebase)http://169.254.169.254/latest/meta-data/iam/security-credentials/Alternatively via Custom Request action:
1. Create custom request with URL http://127.0.0.1:5432 or http://10.0.0.1:8080/admin
2. Execute the action
3. Server makes request to internal service
{
"nvd_published_at": null,
"cwe_ids": [
"CWE-918"
],
"github_reviewed_at": "2026-04-15T19:43:50Z",
"severity": "MODERATE",
"github_reviewed": true
}