AliasVault has addressed a Server-Side Request Forgery (SSRF) vulnerability identified as CVE-2025-59344 (7.7 High). This security advisory details the vulnerability, its impact, and the immediate actions required for all AliasVault users.
π¨ Action Required: All users self-hosting AliasVault 0.23.0 or lower are advised to upgrade to version 0.23.2 as soon as possible, which includes both the security fix from 0.23.1 and additional usability improvements. End-users only using client apps are not affected.
A Server-Side Request Forgery (SSRF) vulnerability was discovered in the favicon extraction feature of AliasVault API versions 0.23.0 and lower. This vulnerability could allow authenticated users to:
Note: this vulnerability did not affect, expose or compromise AliasVault's encrypted user data or passwords in any way.
The favicon extraction feature fetches user-supplied URLs and parses returned HTML to follow <link rel="icon" href="β¦">
references. While the initial URL validation allows only HTTP/HTTPS with default ports, the extractor:
An authenticated, low-privileged user can exploit this behavior to coerce the backend into making HTTP(S) requests to arbitrary internal hosts and non-default ports.
This vulnerability only affects self-hosted AliasVault instances that are reachable from the public internet and have public user registration enabled. Private/internal deployments without public sign-ups are not directly exploitable. Also end-users only using client apps (browser extension or mobile apps) are not affected.
The AliasVault maintainers reacted quickly to this responsibly disclosed vulnerability and published a fix within 12 hours:
Version 0.23.1 was released within 12 hours of the responsible disclosure. This update directly addresses the SSRF vulnerability and introduces comprehensive protections, such as:
Additionally, version 0.23.2 is now also available and includes additional improvements to the browser extension, mobile apps, alias generation, and infrastructure. We recommend upgrading directly to 0.23.2 to benefit from both the security patch and the latest enhancements.
Update immediately by following the official update instructions:
The AliasVault cloud instance has been automatically updated to the latest secure version. No action required.
If you cannot update immediately, reduce exposure by disabling public account registration:
./install.sh configure-registration
Or by manually updating .env and restarting the Docker containers:
PUBLIC_REGISTRATION_ENABLED=false
This prevents unauthorized users from creating accounts that could exploit the vulnerability.
Star the GitHub repository on GitHub, subscribe to the AliasVault RSS news feed or join the AliasVault Discord to get notified about new releases.
We extend our sincere gratitude to Filippo Decortes from Bitcube Security for the responsible disclosure of this vulnerability, the detailed technical analysis that enabled rapid remediation, and the professional coordination throughout the disclosure process.
At AliasVault, security and transparency are the core of what we do. If you have any questions about this update or our security practices, feel free reach out to security@support.aliasvault.net.
We thank the open source community for their valuable feedback and ongoing support!