CVE-2025-10395: Server-Side Request Forgery in Magicblack MacCMS
A vulnerability was found in Magicblack MacCMS 2025.1000.4050. Affected by this vulnerability is the function col_url of the component Scheduled Task Handler. Performing manipulation of the argument cjurl results in server-side request forgery. It is possible to initiate the attack remotely.
AI Analysis
Technical Summary
CVE-2025-10395 is a Server-Side Request Forgery (SSRF) vulnerability identified in Magicblack MacCMS version 2025.1000.4050. The vulnerability resides in the Scheduled Task Handler component, specifically in the function col_url. By manipulating the argument 'cjurl', an attacker can cause the server to make arbitrary HTTP requests. This SSRF flaw allows remote attackers to coerce the vulnerable server into initiating requests to internal or external resources that the attacker would not normally have direct access to. The vulnerability does not require user interaction but does require high privileges (PR:H) on the system to exploit, indicating that the attacker must have some level of authenticated access or elevated permissions to trigger the flaw. The CVSS 4.0 base score is 5.1, categorized as medium severity, with network attack vector (AV:N), low complexity (AC:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability is currently published but no known exploits in the wild have been reported. No patches or mitigation links are provided at this time. SSRF vulnerabilities can be leveraged for reconnaissance of internal networks, accessing sensitive internal services, or bypassing firewall restrictions, potentially leading to further exploitation depending on the internal environment and services accessible via the SSRF.
Potential Impact
For European organizations using Magicblack MacCMS 2025.1000.4050, this SSRF vulnerability poses a moderate risk. Attackers with high privileges could exploit this flaw to perform unauthorized internal network scanning, access internal-only services, or exfiltrate data by making the server act as a proxy. This could lead to exposure of sensitive internal resources, including databases, internal APIs, or cloud metadata services, which may contain confidential information. The medium severity rating reflects the requirement for elevated privileges, which somewhat limits the attack surface but does not eliminate risk, especially in environments where privilege escalation or insider threats are possible. The impact on confidentiality, integrity, and availability is low to moderate but could be escalated if combined with other vulnerabilities or misconfigurations. European organizations in sectors such as media, content management, or digital publishing that rely on MacCMS for content delivery or management could face operational disruptions or data breaches if exploited. Additionally, regulatory frameworks like GDPR impose strict data protection requirements, and exploitation leading to data exposure could result in legal and financial consequences.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement the following specific mitigations: 1) Restrict access to the Scheduled Task Handler component and the col_url function to only trusted administrators and internal networks to reduce the risk of exploitation by unauthorized users. 2) Implement strict input validation and sanitization on the 'cjurl' parameter to prevent manipulation and ensure only allowed URLs or domains can be requested. 3) Employ network segmentation and firewall rules to limit the server's ability to make outbound requests to sensitive internal resources or external untrusted networks. 4) Monitor and log all outgoing requests initiated by the MacCMS server, focusing on unusual or unexpected destinations that could indicate exploitation attempts. 5) Conduct regular privilege audits to ensure that only necessary users have high-level permissions required to exploit this vulnerability. 6) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SSRF attack patterns targeting the col_url parameter. 7) Stay alert for vendor updates or patches addressing this vulnerability and plan prompt deployment once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-10395: Server-Side Request Forgery in Magicblack MacCMS
Description
A vulnerability was found in Magicblack MacCMS 2025.1000.4050. Affected by this vulnerability is the function col_url of the component Scheduled Task Handler. Performing manipulation of the argument cjurl results in server-side request forgery. It is possible to initiate the attack remotely.
AI-Powered Analysis
Technical Analysis
CVE-2025-10395 is a Server-Side Request Forgery (SSRF) vulnerability identified in Magicblack MacCMS version 2025.1000.4050. The vulnerability resides in the Scheduled Task Handler component, specifically in the function col_url. By manipulating the argument 'cjurl', an attacker can cause the server to make arbitrary HTTP requests. This SSRF flaw allows remote attackers to coerce the vulnerable server into initiating requests to internal or external resources that the attacker would not normally have direct access to. The vulnerability does not require user interaction but does require high privileges (PR:H) on the system to exploit, indicating that the attacker must have some level of authenticated access or elevated permissions to trigger the flaw. The CVSS 4.0 base score is 5.1, categorized as medium severity, with network attack vector (AV:N), low complexity (AC:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability is currently published but no known exploits in the wild have been reported. No patches or mitigation links are provided at this time. SSRF vulnerabilities can be leveraged for reconnaissance of internal networks, accessing sensitive internal services, or bypassing firewall restrictions, potentially leading to further exploitation depending on the internal environment and services accessible via the SSRF.
Potential Impact
For European organizations using Magicblack MacCMS 2025.1000.4050, this SSRF vulnerability poses a moderate risk. Attackers with high privileges could exploit this flaw to perform unauthorized internal network scanning, access internal-only services, or exfiltrate data by making the server act as a proxy. This could lead to exposure of sensitive internal resources, including databases, internal APIs, or cloud metadata services, which may contain confidential information. The medium severity rating reflects the requirement for elevated privileges, which somewhat limits the attack surface but does not eliminate risk, especially in environments where privilege escalation or insider threats are possible. The impact on confidentiality, integrity, and availability is low to moderate but could be escalated if combined with other vulnerabilities or misconfigurations. European organizations in sectors such as media, content management, or digital publishing that rely on MacCMS for content delivery or management could face operational disruptions or data breaches if exploited. Additionally, regulatory frameworks like GDPR impose strict data protection requirements, and exploitation leading to data exposure could result in legal and financial consequences.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement the following specific mitigations: 1) Restrict access to the Scheduled Task Handler component and the col_url function to only trusted administrators and internal networks to reduce the risk of exploitation by unauthorized users. 2) Implement strict input validation and sanitization on the 'cjurl' parameter to prevent manipulation and ensure only allowed URLs or domains can be requested. 3) Employ network segmentation and firewall rules to limit the server's ability to make outbound requests to sensitive internal resources or external untrusted networks. 4) Monitor and log all outgoing requests initiated by the MacCMS server, focusing on unusual or unexpected destinations that could indicate exploitation attempts. 5) Conduct regular privilege audits to ensure that only necessary users have high-level permissions required to exploit this vulnerability. 6) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SSRF attack patterns targeting the col_url parameter. 7) Stay alert for vendor updates or patches addressing this vulnerability and plan prompt deployment once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-13T15:16:57.200Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c678f16e1d0c27045ffea3
Added to database: 9/14/2025, 8:12:33 AM
Last enriched: 9/22/2025, 12:32:45 AM
Last updated: 10/30/2025, 7:14:09 AM
Views: 63
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11881: CWE-862 Missing Authorization in scottopolis AppPresser – Mobile App Framework
MediumCVE-2025-62229: Use After Free in Red Hat Red Hat Enterprise Linux 10
HighCVE-2025-11627: CWE-117 Improper Output Neutralization for Logs in sminozzi Site Checkup Debug AI Troubleshooting with Wizard and Tips for Each Issue
MediumCVE-2025-10008: CWE-862 Missing Authorization in remyb92 Translate WordPress and go Multilingual – Weglot
MediumCVE-2025-10636: CWE-79 Cross-Site Scripting (XSS) in NS Maintenance Mode for WP
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.