CVE-2025-10787: Server-Side Request Forgery in MuYuCMS
A vulnerability was found in MuYuCMS up to 2.7. Impacted is an unknown function of the file /index/index.html of the component Add Fiend Link Handler. Performing manipulation of the argument Link URL results in server-side request forgery. The attack may be initiated remotely. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-10787 is a Server-Side Request Forgery (SSRF) vulnerability affecting MuYuCMS versions 2.0 through 2.7. The vulnerability exists in an unspecified function within the /index/index.html file, specifically in the component responsible for handling the 'Add Friend Link' feature. By manipulating the 'Link URL' argument, an attacker can induce the server to make unauthorized HTTP requests to arbitrary internal or external resources. This SSRF flaw can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector. The vulnerability has a CVSS 4.0 base score of 5.3, classifying it as medium severity. The impact on confidentiality, integrity, and availability is limited but non-negligible, as the attacker can potentially access internal services, scan internal networks, or cause the server to interact with malicious endpoints. No public exploits are currently known in the wild, and no patches or mitigations have been officially released at the time of publication. The vulnerability is exploitable over the network with low complexity and no privileges required, but it has limited impact on the victim system's core functions. The lack of authentication and user interaction requirements increases the risk of automated exploitation attempts. The SSRF could be leveraged as a stepping stone for further attacks, such as internal network reconnaissance, accessing metadata services in cloud environments, or exploiting other internal vulnerabilities not directly exposed to the internet. However, the direct impact on the CMS data or server integrity appears limited based on available information.
Potential Impact
For European organizations using MuYuCMS, this vulnerability poses a moderate risk. SSRF attacks can allow attackers to bypass perimeter defenses and access internal network resources that are otherwise inaccessible externally. This could lead to exposure of sensitive internal services, unauthorized data access, or pivoting to more critical systems. Organizations hosting MuYuCMS on cloud infrastructure may be particularly at risk if the SSRF can be used to query cloud metadata services, potentially exposing credentials or configuration data. The medium severity rating suggests that while immediate damage may be limited, the vulnerability could be exploited as part of a multi-stage attack chain. European entities relying on MuYuCMS for web content management should be aware that attackers could leverage this flaw to gather intelligence about internal network topology or to launch further attacks against internal systems. The absence of known exploits in the wild reduces immediate urgency but does not eliminate risk, especially given the public disclosure of the vulnerability details. The impact is more pronounced for organizations with sensitive internal services behind the CMS server or those lacking network segmentation and strict egress filtering.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement the following specific mitigations: 1) Immediately audit and restrict the 'Add Friend Link' functionality, disabling it if not essential, or applying strict input validation and sanitization on the 'Link URL' parameter to prevent arbitrary URLs. 2) Implement network-level egress filtering on the CMS server to restrict outbound HTTP/HTTPS requests only to trusted destinations, preventing SSRF exploitation from reaching internal or sensitive endpoints. 3) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious SSRF patterns targeting the vulnerable parameter. 4) Monitor server logs for unusual outbound requests or access patterns indicative of SSRF attempts. 5) Isolate the CMS server within a segmented network zone with minimal access to internal resources and sensitive services. 6) Plan for prompt patching once an official update becomes available from MuYuCMS developers. 7) Conduct internal penetration testing to identify any additional SSRF or related vulnerabilities. These targeted mitigations go beyond generic advice by focusing on the specific vulnerable component and practical network controls to reduce exploitation risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-10787: Server-Side Request Forgery in MuYuCMS
Description
A vulnerability was found in MuYuCMS up to 2.7. Impacted is an unknown function of the file /index/index.html of the component Add Fiend Link Handler. Performing manipulation of the argument Link URL results in server-side request forgery. The attack may be initiated remotely. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10787 is a Server-Side Request Forgery (SSRF) vulnerability affecting MuYuCMS versions 2.0 through 2.7. The vulnerability exists in an unspecified function within the /index/index.html file, specifically in the component responsible for handling the 'Add Friend Link' feature. By manipulating the 'Link URL' argument, an attacker can induce the server to make unauthorized HTTP requests to arbitrary internal or external resources. This SSRF flaw can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector. The vulnerability has a CVSS 4.0 base score of 5.3, classifying it as medium severity. The impact on confidentiality, integrity, and availability is limited but non-negligible, as the attacker can potentially access internal services, scan internal networks, or cause the server to interact with malicious endpoints. No public exploits are currently known in the wild, and no patches or mitigations have been officially released at the time of publication. The vulnerability is exploitable over the network with low complexity and no privileges required, but it has limited impact on the victim system's core functions. The lack of authentication and user interaction requirements increases the risk of automated exploitation attempts. The SSRF could be leveraged as a stepping stone for further attacks, such as internal network reconnaissance, accessing metadata services in cloud environments, or exploiting other internal vulnerabilities not directly exposed to the internet. However, the direct impact on the CMS data or server integrity appears limited based on available information.
Potential Impact
For European organizations using MuYuCMS, this vulnerability poses a moderate risk. SSRF attacks can allow attackers to bypass perimeter defenses and access internal network resources that are otherwise inaccessible externally. This could lead to exposure of sensitive internal services, unauthorized data access, or pivoting to more critical systems. Organizations hosting MuYuCMS on cloud infrastructure may be particularly at risk if the SSRF can be used to query cloud metadata services, potentially exposing credentials or configuration data. The medium severity rating suggests that while immediate damage may be limited, the vulnerability could be exploited as part of a multi-stage attack chain. European entities relying on MuYuCMS for web content management should be aware that attackers could leverage this flaw to gather intelligence about internal network topology or to launch further attacks against internal systems. The absence of known exploits in the wild reduces immediate urgency but does not eliminate risk, especially given the public disclosure of the vulnerability details. The impact is more pronounced for organizations with sensitive internal services behind the CMS server or those lacking network segmentation and strict egress filtering.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement the following specific mitigations: 1) Immediately audit and restrict the 'Add Friend Link' functionality, disabling it if not essential, or applying strict input validation and sanitization on the 'Link URL' parameter to prevent arbitrary URLs. 2) Implement network-level egress filtering on the CMS server to restrict outbound HTTP/HTTPS requests only to trusted destinations, preventing SSRF exploitation from reaching internal or sensitive endpoints. 3) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious SSRF patterns targeting the vulnerable parameter. 4) Monitor server logs for unusual outbound requests or access patterns indicative of SSRF attempts. 5) Isolate the CMS server within a segmented network zone with minimal access to internal resources and sensitive services. 6) Plan for prompt patching once an official update becomes available from MuYuCMS developers. 7) Conduct internal penetration testing to identify any additional SSRF or related vulnerabilities. These targeted mitigations go beyond generic advice by focusing on the specific vulnerable component and practical network controls to reduce exploitation risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-21T09:05:35.175Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d0f4b66189482ceecd2b30
Added to database: 9/22/2025, 7:03:18 AM
Last enriched: 9/22/2025, 7:03:47 AM
Last updated: 9/23/2025, 12:10:57 AM
Views: 13
Related Threats
CVE-2025-10827: Cross Site Scripting in PHPJabbers Restaurant Menu Maker
MediumCVE-2025-10826: SQL Injection in Campcodes Online Beauty Parlor Management System
MediumCVE-2025-10825: SQL Injection in Campcodes Online Beauty Parlor Management System
MediumCVE-2025-10824: Use After Free in axboe fio
MediumCVE-2025-46711: CWE-476: NULL Pointer Dereference in Imagination Technologies Graphics DDK
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.