Skip to main content

CVE-2025-10765: Server-Side Request Forgery in SeriaWei ZKEACMS

Medium
VulnerabilityCVE-2025-10765cvecve-2025-10765
Published: Sun Sep 21 2025 (09/21/2025, 06:32:06 UTC)
Source: CVE Database V5
Vendor/Project: SeriaWei
Product: ZKEACMS

Description

A security flaw has been discovered in SeriaWei ZKEACMS up to 4.3. This vulnerability affects the function CheckPage/Suggestions in the library cms-v4.3\wwwroot\Plugins\ZKEACMS.SEOSuggestions\ZKEACMS.SEOSuggestions.dll of the component SEOSuggestions. Performing manipulation results in server-side request forgery. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/22/2025, 00:08:34 UTC

Technical Analysis

CVE-2025-10765 is a Server-Side Request Forgery (SSRF) vulnerability identified in SeriaWei's ZKEACMS content management system, specifically affecting versions 4.0 through 4.3. The vulnerability resides in the CheckPage/Suggestions function within the SEOSuggestions plugin component (ZKEACMS.SEOSuggestions.dll). SSRF vulnerabilities allow an attacker to manipulate server-side requests, causing the server to send crafted requests to internal or external resources that the attacker would otherwise be unable to access directly. In this case, the vulnerability can be triggered remotely without user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:H). The attack complexity is low, but it requires high privileges (PR:H), suggesting that the attacker must have some level of authenticated access or elevated permissions to exploit the flaw. The impact on confidentiality, integrity, and availability is low, but the vulnerability could be leveraged to access internal services, potentially leading to further exploitation or information disclosure. The vendor was notified but did not respond, and no patches have been released yet. Although no known exploits are currently observed in the wild, the public release of exploit code increases the risk of exploitation. The CVSS 4.0 base score is 5.1, categorizing this as a medium severity vulnerability. The lack of authentication requirement for user interaction reduces the attack surface, but the need for high privileges limits the ease of exploitation to some extent. Overall, this SSRF vulnerability poses a moderate risk, especially in environments where ZKEACMS is deployed with sensitive internal network access or where privilege escalation is possible.

Potential Impact

For European organizations using SeriaWei ZKEACMS versions 4.0 to 4.3, this SSRF vulnerability could allow attackers with elevated privileges to manipulate server requests to internal or external systems. This could lead to unauthorized access to internal services, potentially exposing sensitive data or enabling lateral movement within the network. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on ZKEACMS for web content management may face increased risk of data leakage or further compromise. The medium severity rating reflects that while direct impact on confidentiality, integrity, or availability is limited, the SSRF can serve as a pivot point for more severe attacks. The absence of vendor response and patches increases the urgency for organizations to implement mitigations. Additionally, the public availability of exploit code heightens the threat landscape, making European entities with ZKEACMS deployments more attractive targets for opportunistic attackers or advanced persistent threat (APT) groups aiming to exploit internal network trust boundaries.

Mitigation Recommendations

Given the lack of official patches, European organizations should implement several practical mitigations: 1) Restrict access to the vulnerable SEOSuggestions plugin or disable it entirely if not critical to operations. 2) Implement strict network segmentation and firewall rules to limit the web server's ability to make arbitrary outbound requests, especially to internal services. 3) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious SSRF payloads targeting the CheckPage/Suggestions function. 4) Monitor logs for unusual outbound requests originating from the CMS server, focusing on internal IP ranges and uncommon destinations. 5) Enforce the principle of least privilege for CMS users and services to reduce the likelihood of attackers obtaining the required high privileges. 6) Conduct regular security assessments and penetration tests to identify potential exploitation attempts. 7) Prepare incident response plans specific to SSRF exploitation scenarios. Organizations should also engage with SeriaWei for updates and consider alternative CMS solutions if timely patches are not forthcoming.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-20T08:47:44.418Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d0935fb68a0c387d42a925

Added to database: 9/22/2025, 12:07:59 AM

Last enriched: 9/22/2025, 12:08:34 AM

Last updated: 9/24/2025, 12:09:15 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats