CVE-2025-10764: Server-Side Request Forgery in SeriaWei ZKEACMS
A vulnerability was identified in SeriaWei ZKEACMS up to 4.3. This affects the function Edit of the file src/ZKEACMS.EventAction/Controllers/PendingTaskController.cs of the component Event Action System. Such manipulation of the argument Data leads to server-side request forgery. The attack may be performed from remote. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10764 is a server-side request forgery (SSRF) vulnerability affecting SeriaWei's ZKEACMS content management system versions 4.0 through 4.3. The vulnerability resides in the Edit function within the PendingTaskController.cs file of the Event Action System component. Specifically, improper validation or sanitization of the 'Data' argument allows an attacker to manipulate server-side requests. SSRF vulnerabilities enable attackers to make the vulnerable server perform unauthorized requests to internal or external resources, potentially bypassing network restrictions. This can lead to information disclosure, internal network reconnaissance, or interaction with otherwise inaccessible services. The vulnerability can be exploited remotely without user interaction or authentication, increasing its risk profile. Although the vendor was notified early, no response or patch has been provided, and a public exploit is available, raising the likelihood of exploitation. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the moderate impact on confidentiality, integrity, and availability, with low attack complexity and no required privileges or user interaction. The vulnerability does not affect the system's scope or cause complete system compromise directly but can be leveraged as a stepping stone for further attacks within the network or against internal services. No known exploits in the wild have been reported yet, but the public availability of exploit code increases the risk of imminent attacks.
Potential Impact
For European organizations using ZKEACMS versions 4.0 to 4.3, this SSRF vulnerability poses a significant risk. Attackers can exploit the flaw to access internal network resources that are otherwise protected by firewalls or network segmentation, potentially exposing sensitive internal services, databases, or administrative interfaces. This can lead to unauthorized data access, lateral movement within the network, or disruption of internal services. Given that ZKEACMS is a CMS platform, exploitation could also facilitate further attacks such as injecting malicious content or pivoting to other systems. The lack of vendor response and patches increases exposure time, raising the urgency for organizations to implement mitigations. European organizations in sectors with high regulatory requirements for data protection (e.g., finance, healthcare, government) may face compliance risks if internal data is exposed. Additionally, the medium severity rating suggests that while the vulnerability is not immediately critical, it can be exploited with relative ease and should not be ignored.
Mitigation Recommendations
Since no official patch is available, European organizations should implement immediate compensating controls. First, restrict network egress from the ZKEACMS server to only necessary external destinations using firewall rules or network segmentation to limit SSRF impact. Implement strict input validation and sanitization on the 'Data' parameter at the application or web server level, if possible, to block malicious payloads. Monitor logs for unusual outbound requests originating from the CMS server, which may indicate exploitation attempts. Employ web application firewalls (WAFs) with custom rules to detect and block SSRF patterns targeting the vulnerable endpoint. Consider isolating the CMS server in a dedicated network segment with limited access to internal resources. If feasible, upgrade to a newer version of ZKEACMS once a patch is released or consider alternative CMS platforms with active security support. Conduct regular vulnerability scanning and penetration testing focused on SSRF and related issues. Finally, maintain heightened awareness and incident response readiness for potential exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-10764: Server-Side Request Forgery in SeriaWei ZKEACMS
Description
A vulnerability was identified in SeriaWei ZKEACMS up to 4.3. This affects the function Edit of the file src/ZKEACMS.EventAction/Controllers/PendingTaskController.cs of the component Event Action System. Such manipulation of the argument Data leads to server-side request forgery. The attack may be performed from remote. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10764 is a server-side request forgery (SSRF) vulnerability affecting SeriaWei's ZKEACMS content management system versions 4.0 through 4.3. The vulnerability resides in the Edit function within the PendingTaskController.cs file of the Event Action System component. Specifically, improper validation or sanitization of the 'Data' argument allows an attacker to manipulate server-side requests. SSRF vulnerabilities enable attackers to make the vulnerable server perform unauthorized requests to internal or external resources, potentially bypassing network restrictions. This can lead to information disclosure, internal network reconnaissance, or interaction with otherwise inaccessible services. The vulnerability can be exploited remotely without user interaction or authentication, increasing its risk profile. Although the vendor was notified early, no response or patch has been provided, and a public exploit is available, raising the likelihood of exploitation. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the moderate impact on confidentiality, integrity, and availability, with low attack complexity and no required privileges or user interaction. The vulnerability does not affect the system's scope or cause complete system compromise directly but can be leveraged as a stepping stone for further attacks within the network or against internal services. No known exploits in the wild have been reported yet, but the public availability of exploit code increases the risk of imminent attacks.
Potential Impact
For European organizations using ZKEACMS versions 4.0 to 4.3, this SSRF vulnerability poses a significant risk. Attackers can exploit the flaw to access internal network resources that are otherwise protected by firewalls or network segmentation, potentially exposing sensitive internal services, databases, or administrative interfaces. This can lead to unauthorized data access, lateral movement within the network, or disruption of internal services. Given that ZKEACMS is a CMS platform, exploitation could also facilitate further attacks such as injecting malicious content or pivoting to other systems. The lack of vendor response and patches increases exposure time, raising the urgency for organizations to implement mitigations. European organizations in sectors with high regulatory requirements for data protection (e.g., finance, healthcare, government) may face compliance risks if internal data is exposed. Additionally, the medium severity rating suggests that while the vulnerability is not immediately critical, it can be exploited with relative ease and should not be ignored.
Mitigation Recommendations
Since no official patch is available, European organizations should implement immediate compensating controls. First, restrict network egress from the ZKEACMS server to only necessary external destinations using firewall rules or network segmentation to limit SSRF impact. Implement strict input validation and sanitization on the 'Data' parameter at the application or web server level, if possible, to block malicious payloads. Monitor logs for unusual outbound requests originating from the CMS server, which may indicate exploitation attempts. Employ web application firewalls (WAFs) with custom rules to detect and block SSRF patterns targeting the vulnerable endpoint. Consider isolating the CMS server in a dedicated network segment with limited access to internal resources. If feasible, upgrade to a newer version of ZKEACMS once a patch is released or consider alternative CMS platforms with active security support. Conduct regular vulnerability scanning and penetration testing focused on SSRF and related issues. Finally, maintain heightened awareness and incident response readiness for potential exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-20T08:47:34.507Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d0935fb68a0c387d42a92b
Added to database: 9/22/2025, 12:07:59 AM
Last enriched: 9/29/2025, 12:46:25 AM
Last updated: 11/7/2025, 2:33:27 AM
Views: 57
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11546: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in NEC Corporation CLUSTERPRO X for Linux (EXPRESSCLUSTER X for Linux)
CriticalCVE-2024-9683: Authentication Bypass by Primary Weakness
MediumCVE-2025-52662: Vulnerability in Vercel Nuxt Devtools
MediumCVE-2025-48985: Vulnerability in Vercel AI SDK
LowCVE-2025-12789: URL Redirection to Untrusted Site ('Open Redirect') in Red Hat Red Hat Single Sign-On 7
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.