Skip to main content

CVE-2025-10329: Server-Side Request Forgery in cdevroe unmark

Medium
VulnerabilityCVE-2025-10329cvecve-2025-10329
Published: Fri Sep 12 2025 (09/12/2025, 22:02:05 UTC)
Source: CVE Database V5
Vendor/Project: cdevroe
Product: unmark

Description

A vulnerability was detected in cdevroe unmark up to 1.9.3. This affects an unknown part of the file /application/controllers/Marks.php. The manipulation of the argument url results in server-side request forgery. The attack may be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/12/2025, 23:17:07 UTC

Technical Analysis

CVE-2025-10329 is a Server-Side Request Forgery (SSRF) vulnerability identified in the cdevroe unmark application, specifically affecting versions 1.9.0 through 1.9.3. The vulnerability resides in the /application/controllers/Marks.php file, where the 'url' argument can be manipulated by an attacker. This manipulation allows an attacker to craft requests that the server then makes on their behalf to arbitrary internal or external resources. SSRF vulnerabilities can be exploited remotely without authentication or user interaction, enabling attackers to bypass network access controls, access internal systems, or perform reconnaissance on internal infrastructure. The vulnerability has a CVSS 4.0 base score of 5.3, indicating a medium severity level. The vector details show that the attack requires no user interaction and no privileges, with low complexity and partial impact on confidentiality, integrity, and availability. The vendor was contacted but did not respond, and no patches or mitigations have been published yet. Although no known exploits are currently in the wild, the exploit code is publicly available, increasing the risk of exploitation. This vulnerability is particularly concerning because SSRF can be leveraged to access sensitive internal services, potentially leading to further compromise or data exfiltration if combined with other vulnerabilities or misconfigurations.

Potential Impact

For European organizations using cdevroe unmark versions 1.9.0 to 1.9.3, this SSRF vulnerability poses a moderate risk. Exploitation could allow attackers to access internal network resources that are otherwise protected by firewalls or network segmentation, potentially exposing sensitive data or internal APIs. This could lead to unauthorized access to confidential information, disruption of service, or pivoting deeper into the network. Organizations in sectors with strict data protection regulations, such as finance, healthcare, or government, could face compliance risks and reputational damage if internal data is exposed. The fact that the vulnerability can be exploited remotely without authentication increases the attack surface, especially for publicly accessible instances of unmark. The lack of vendor response and absence of patches means organizations must rely on their own mitigations, increasing operational burden and risk exposure.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement the following specific mitigations: 1) Immediately audit all instances of cdevroe unmark to identify affected versions and isolate them from public internet access where possible. 2) Implement strict network egress filtering to restrict the server's ability to make outbound HTTP requests to only trusted destinations, thereby limiting SSRF exploitation scope. 3) Use web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable 'url' parameter in Marks.php. 4) Monitor logs for unusual outbound requests or access patterns indicative of SSRF attempts. 5) Consider deploying reverse proxies or API gateways that validate and sanitize incoming URL parameters before they reach the application. 6) If feasible, upgrade to a non-vulnerable version of the software or replace unmark with alternative solutions until a patch is released. 7) Conduct internal penetration testing focused on SSRF to identify and remediate similar weaknesses. These targeted actions go beyond generic advice by focusing on network-level controls and application-layer filtering specific to the vulnerability's exploitation vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-12T08:46:01.011Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c4a9e26da8ad0abf36f273

Added to database: 9/12/2025, 11:16:50 PM

Last enriched: 9/12/2025, 11:17:07 PM

Last updated: 9/13/2025, 4:06:49 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats