Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10395: Server-Side Request Forgery in Magicblack MacCMS

0
Medium
VulnerabilityCVE-2025-10395cvecve-2025-10395
Published: Sun Sep 14 2025 (09/14/2025, 08:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Magicblack
Product: MacCMS

Description

A vulnerability was found in Magicblack MacCMS 2025.1000.4050. Affected by this vulnerability is the function col_url of the component Scheduled Task Handler. Performing manipulation of the argument cjurl results in server-side request forgery. It is possible to initiate the attack remotely.

AI-Powered Analysis

AILast updated: 09/22/2025, 00:32:45 UTC

Technical Analysis

CVE-2025-10395 is a Server-Side Request Forgery (SSRF) vulnerability identified in Magicblack MacCMS version 2025.1000.4050. The vulnerability resides in the Scheduled Task Handler component, specifically in the function col_url. By manipulating the argument 'cjurl', an attacker can cause the server to make arbitrary HTTP requests. This SSRF flaw allows remote attackers to coerce the vulnerable server into initiating requests to internal or external resources that the attacker would not normally have direct access to. The vulnerability does not require user interaction but does require high privileges (PR:H) on the system to exploit, indicating that the attacker must have some level of authenticated access or elevated permissions to trigger the flaw. The CVSS 4.0 base score is 5.1, categorized as medium severity, with network attack vector (AV:N), low complexity (AC:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability is currently published but no known exploits in the wild have been reported. No patches or mitigation links are provided at this time. SSRF vulnerabilities can be leveraged for reconnaissance of internal networks, accessing sensitive internal services, or bypassing firewall restrictions, potentially leading to further exploitation depending on the internal environment and services accessible via the SSRF.

Potential Impact

For European organizations using Magicblack MacCMS 2025.1000.4050, this SSRF vulnerability poses a moderate risk. Attackers with high privileges could exploit this flaw to perform unauthorized internal network scanning, access internal-only services, or exfiltrate data by making the server act as a proxy. This could lead to exposure of sensitive internal resources, including databases, internal APIs, or cloud metadata services, which may contain confidential information. The medium severity rating reflects the requirement for elevated privileges, which somewhat limits the attack surface but does not eliminate risk, especially in environments where privilege escalation or insider threats are possible. The impact on confidentiality, integrity, and availability is low to moderate but could be escalated if combined with other vulnerabilities or misconfigurations. European organizations in sectors such as media, content management, or digital publishing that rely on MacCMS for content delivery or management could face operational disruptions or data breaches if exploited. Additionally, regulatory frameworks like GDPR impose strict data protection requirements, and exploitation leading to data exposure could result in legal and financial consequences.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement the following specific mitigations: 1) Restrict access to the Scheduled Task Handler component and the col_url function to only trusted administrators and internal networks to reduce the risk of exploitation by unauthorized users. 2) Implement strict input validation and sanitization on the 'cjurl' parameter to prevent manipulation and ensure only allowed URLs or domains can be requested. 3) Employ network segmentation and firewall rules to limit the server's ability to make outbound requests to sensitive internal resources or external untrusted networks. 4) Monitor and log all outgoing requests initiated by the MacCMS server, focusing on unusual or unexpected destinations that could indicate exploitation attempts. 5) Conduct regular privilege audits to ensure that only necessary users have high-level permissions required to exploit this vulnerability. 6) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SSRF attack patterns targeting the col_url parameter. 7) Stay alert for vendor updates or patches addressing this vulnerability and plan prompt deployment once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-13T15:16:57.200Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c678f16e1d0c27045ffea3

Added to database: 9/14/2025, 8:12:33 AM

Last enriched: 9/22/2025, 12:32:45 AM

Last updated: 10/30/2025, 7:14:09 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats