Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10764: Server-Side Request Forgery in SeriaWei ZKEACMS

0
Medium
VulnerabilityCVE-2025-10764cvecve-2025-10764
Published: Sun Sep 21 2025 (09/21/2025, 05:32:05 UTC)
Source: CVE Database V5
Vendor/Project: SeriaWei
Product: ZKEACMS

Description

A vulnerability was identified in SeriaWei ZKEACMS up to 4.3. This affects the function Edit of the file src/ZKEACMS.EventAction/Controllers/PendingTaskController.cs of the component Event Action System. Such manipulation of the argument Data leads to server-side request forgery. The attack may be performed from remote. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/29/2025, 00:46:25 UTC

Technical Analysis

CVE-2025-10764 is a server-side request forgery (SSRF) vulnerability affecting SeriaWei's ZKEACMS content management system versions 4.0 through 4.3. The vulnerability resides in the Edit function within the PendingTaskController.cs file of the Event Action System component. Specifically, improper validation or sanitization of the 'Data' argument allows an attacker to manipulate server-side requests. SSRF vulnerabilities enable attackers to make the vulnerable server perform unauthorized requests to internal or external resources, potentially bypassing network restrictions. This can lead to information disclosure, internal network reconnaissance, or interaction with otherwise inaccessible services. The vulnerability can be exploited remotely without user interaction or authentication, increasing its risk profile. Although the vendor was notified early, no response or patch has been provided, and a public exploit is available, raising the likelihood of exploitation. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the moderate impact on confidentiality, integrity, and availability, with low attack complexity and no required privileges or user interaction. The vulnerability does not affect the system's scope or cause complete system compromise directly but can be leveraged as a stepping stone for further attacks within the network or against internal services. No known exploits in the wild have been reported yet, but the public availability of exploit code increases the risk of imminent attacks.

Potential Impact

For European organizations using ZKEACMS versions 4.0 to 4.3, this SSRF vulnerability poses a significant risk. Attackers can exploit the flaw to access internal network resources that are otherwise protected by firewalls or network segmentation, potentially exposing sensitive internal services, databases, or administrative interfaces. This can lead to unauthorized data access, lateral movement within the network, or disruption of internal services. Given that ZKEACMS is a CMS platform, exploitation could also facilitate further attacks such as injecting malicious content or pivoting to other systems. The lack of vendor response and patches increases exposure time, raising the urgency for organizations to implement mitigations. European organizations in sectors with high regulatory requirements for data protection (e.g., finance, healthcare, government) may face compliance risks if internal data is exposed. Additionally, the medium severity rating suggests that while the vulnerability is not immediately critical, it can be exploited with relative ease and should not be ignored.

Mitigation Recommendations

Since no official patch is available, European organizations should implement immediate compensating controls. First, restrict network egress from the ZKEACMS server to only necessary external destinations using firewall rules or network segmentation to limit SSRF impact. Implement strict input validation and sanitization on the 'Data' parameter at the application or web server level, if possible, to block malicious payloads. Monitor logs for unusual outbound requests originating from the CMS server, which may indicate exploitation attempts. Employ web application firewalls (WAFs) with custom rules to detect and block SSRF patterns targeting the vulnerable endpoint. Consider isolating the CMS server in a dedicated network segment with limited access to internal resources. If feasible, upgrade to a newer version of ZKEACMS once a patch is released or consider alternative CMS platforms with active security support. Conduct regular vulnerability scanning and penetration testing focused on SSRF and related issues. Finally, maintain heightened awareness and incident response readiness for potential exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-20T08:47:34.507Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d0935fb68a0c387d42a92b

Added to database: 9/22/2025, 12:07:59 AM

Last enriched: 9/29/2025, 12:46:25 AM

Last updated: 11/7/2025, 2:33:27 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats