CodeAnt AI home page
Search...
⌘K
Dashboard
Dashboard
Search...
Navigation
Documentation
Demo Call with CEO
Blog
Slack
Get Started
CodeAnt AI
Setup
Control Center
Pull Request Review
IDE
Compliance
Anti-Patterns
Code Governance
Infrastructure Security Database
Application Security Database
Apex
Bash
C
Clojure
Cpp
Csharp
Dockerfile
Elixir
Fingerprints
Generic
Go
Html
Java
Javascript
Ajv
Angular
Apollo
Argon2
Audit
Aws-lambda
Axios
Bluebird
Browser
Chrome-remote-interface
Crypto
Deno
Express
Fbjs
Firebase
Grpc
Intercom
Jose
Jquery
Jsonwebtoken
Jssha
Jwt-simple
Knex
Lang
Monaco-editor
Mongodb
Mongoose
Mssql
Mysql
Node-expat
Passport-jwt
Pg
Phantom
Playwright
Puppeteer
React
Sandbox
Sax
Sequelize
Serialize-javascript
Shelljs
Superagent
Thenify
Vm2
Vue
Wkhtmltoimage
Wkhtmltopdf
Security
Audit
Xml2json
Json
Kotlin
Ocaml
Php
Problem-based-packs
Python
Ruby
Rust
Scala
Solidity
Swift
Terraform
Typescript
Yaml
Open Source
Security
Audit
wkhtmltopdf-injection
If unverified user data can reach the
wkhtmltopdf
it can result in Server-Side Request Forgery vulnerabilities
Likelihood
: LOW
Confidence
: LOW
CWE
:
- CWE-918: Server-Side Request Forgery (SSRF)
OWASP
:
- A10:2021 - Server-Side Request Forgery (SSRF)
Audit
Audit
Assistant
Responses are generated using AI and may contain mistakes.