Cyber Posture

CVE-2024-8952

HighPublic PoC

Published: 20 March 2025

Published
20 March 2025
Modified
01 April 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0015 35.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-8952 is a high-severity SSRF (CWE-918) vulnerability in Composio Composio. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 35.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-4 (Information Flow Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Validates user-supplied URLs at the WEBTOOL_SCRAPE_WEBSITE_CONTENT endpoint to block crafted inputs targeting internal files, AWS metadata, or local services.

prevent

Enforces flow control policies restricting the endpoint's requests to authorized external destinations only, preventing SSRF access to internal resources.

preventdetect

Provides boundary protection through egress filtering and monitoring to block or identify SSRF-induced connections to localhost or metadata services.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1552.005 Cloud Instance Metadata API Credential Access
Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data.
Why these techniques?

SSRF in public-facing /api endpoint directly enables T1190; facilitates local file reads (T1005) and AWS instance metadata access (T1552.005).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A Server-Side Request Forgery (SSRF) vulnerability exists in composiohq/composio version v0.4.2, specifically in the /api/actions/execute/WEBTOOL_SCRAPE_WEBSITE_CONTENT endpoint. This vulnerability allows an attacker to read files, access AWS metadata, and interact with local services on the system.

Deeper analysisAI

CVE-2024-8952 is a Server-Side Request Forgery (SSRF) vulnerability, mapped to CWE-918, affecting composiohq/composio version v0.4.2. The flaw exists specifically in the /api/actions/execute/WEBTOOL_SCRAPE_WEBSITE_CONTENT endpoint. Published on 2025-03-20, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), reflecting high confidentiality impact from network-accessible exploitation with low complexity and no privileges or user interaction required.

An unauthenticated remote attacker can exploit this SSRF vulnerability by sending crafted requests to the affected endpoint. This enables the attacker to read arbitrary files on the server, access AWS instance metadata services, and interact with other local services running on the host system.

Details on mitigation and patches are available in the advisory published on Huntr.com at https://huntr.com/bounties/d1acdd38-10d7-45df-9df0-9fc71f0e1c2a.

Details

CWE(s)

Affected Products

composio
composio
0.4.2

CVEs Like This One

CVE-2024-8955Same product: Composio Composio
CVE-2024-8958Same product: Composio Composio
CVE-2024-8953Same product: Composio Composio
CVE-2024-57767Shared CWE-918
CVE-2026-40516Shared CWE-918
CVE-2025-54122Shared CWE-918
CVE-2025-13096Shared CWE-918
CVE-2025-50180Shared CWE-918
CVE-2024-25181Shared CWE-918
CVE-2026-39361Shared CWE-918

References