Skip to main content

CVE-2025-10764: Server-Side Request Forgery in SeriaWei ZKEACMS

Medium
VulnerabilityCVE-2025-10764cvecve-2025-10764
Published: Sun Sep 21 2025 (09/21/2025, 05:32:05 UTC)
Source: CVE Database V5
Vendor/Project: SeriaWei
Product: ZKEACMS

Description

A vulnerability was identified in SeriaWei ZKEACMS up to 4.3. This affects the function Edit of the file src/ZKEACMS.EventAction/Controllers/PendingTaskController.cs of the component Event Action System. Such manipulation of the argument Data leads to server-side request forgery. The attack may be performed from remote. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/22/2025, 00:08:46 UTC

Technical Analysis

CVE-2025-10764 is a Server-Side Request Forgery (SSRF) vulnerability identified in SeriaWei's ZKEACMS content management system, specifically affecting versions 4.0 through 4.3. The vulnerability resides in the Edit function of the PendingTaskController.cs file within the Event Action System component. An attacker can manipulate the 'Data' argument passed to this function to induce the server to make unauthorized HTTP requests to internal or external resources. SSRF vulnerabilities allow attackers to bypass network access controls, potentially accessing internal services that are not exposed externally, leading to information disclosure, internal network reconnaissance, or further exploitation. The vulnerability can be exploited remotely without requiring user interaction or authentication, increasing its risk profile. Although the vendor was notified early, no response or patch has been provided, and a public exploit is available, which raises the likelihood of exploitation. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the vulnerability's moderate impact on confidentiality, integrity, and availability, with low attack complexity and no privileges or user interaction required. However, the vulnerability's scope is limited to the ZKEACMS product and its Event Action System component. No known exploits in the wild have been reported yet, but the availability of a public exploit increases the urgency for mitigation.

Potential Impact

For European organizations using ZKEACMS versions 4.0 to 4.3, this SSRF vulnerability poses a significant risk. Attackers could leverage it to access internal network resources, potentially bypassing firewalls and other perimeter defenses. This could lead to unauthorized access to sensitive internal services such as databases, internal APIs, or cloud metadata services, resulting in data leakage or further compromise. The ability to perform SSRF without authentication or user interaction means attackers can automate exploitation at scale. Organizations relying on ZKEACMS for web content management, especially those hosting sensitive or regulated data, could face confidentiality breaches and service disruptions. Given the lack of vendor response and patches, European entities may experience prolonged exposure. Additionally, SSRF can be a stepping stone for lateral movement within networks, increasing the risk of broader compromise. The medium severity score suggests moderate but tangible risk, especially in environments where ZKEACMS is integrated with critical internal systems.

Mitigation Recommendations

1. Immediate mitigation should include restricting network egress from the ZKEACMS server to only necessary destinations, using firewall rules or network segmentation to limit the impact of SSRF exploitation. 2. Implement strict input validation and sanitization on the 'Data' parameter in the PendingTaskController's Edit function to block malicious URLs or IP addresses, including localhost and private IP ranges. 3. Deploy web application firewalls (WAFs) with custom rules to detect and block SSRF attack patterns targeting ZKEACMS endpoints. 4. Monitor logs for unusual outbound HTTP requests originating from the CMS server, which may indicate exploitation attempts. 5. If feasible, isolate the CMS server in a dedicated network segment with minimal access to internal resources. 6. Engage with SeriaWei or community forums to track any forthcoming patches or unofficial fixes and apply them promptly once available. 7. Consider temporary replacement or removal of the vulnerable Event Action System component if it is not critical to operations. 8. Conduct internal penetration testing focused on SSRF vectors to identify and remediate similar weaknesses in the environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-20T08:47:34.507Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d0935fb68a0c387d42a92b

Added to database: 9/22/2025, 12:07:59 AM

Last enriched: 9/22/2025, 12:08:46 AM

Last updated: 9/24/2025, 12:09:15 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats