CVE-2025-11674: CWE-918 Server-Side Request Forgery (SSRF) in PiExtract SOOP-CLM
SOOP-CLM developed by PiExtract has a Server-Side Request Forgery vulnerability, allowing privileged remote attackers to read server files or probe internal network information.
AI Analysis
Technical Summary
CVE-2025-11674 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, affecting PiExtract's SOOP-CLM software versions 5.2 and 5.3. SSRF vulnerabilities occur when an attacker can abuse a server's functionality to send crafted requests from the server itself to internal or external systems that the attacker cannot directly access. In this case, the vulnerability allows privileged remote attackers to coerce the SOOP-CLM server into making unauthorized requests, which can lead to reading sensitive files on the server or probing internal network resources that are otherwise inaccessible externally. The vulnerability requires the attacker to have high privileges on the system, but does not require user interaction, making exploitation feasible once access is obtained. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), high privileges required (PR:H), no user interaction (UI:N), and high impact on confidentiality (VC:H) with no impact on integrity or availability. This suggests that the primary risk is unauthorized disclosure of sensitive information rather than disruption or modification of data. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. However, the vulnerability poses a significant risk for internal reconnaissance and data leakage within affected environments. SOOP-CLM is a contract lifecycle management product, often used in enterprise environments, which may contain sensitive contractual and organizational data, increasing the potential impact of this vulnerability.
Potential Impact
For European organizations, the impact of CVE-2025-11674 can be substantial, especially for those relying on SOOP-CLM for managing sensitive contracts and internal workflows. Exploitation could lead to unauthorized disclosure of confidential contract details, intellectual property, or internal network architecture. This could facilitate further attacks such as lateral movement, privilege escalation, or targeted espionage. Organizations in regulated sectors such as finance, healthcare, and government may face compliance violations and reputational damage if sensitive data is exposed. Additionally, internal network probing could reveal critical infrastructure components, increasing the risk of subsequent attacks. The requirement for high privileges to exploit somewhat limits the threat to insiders or attackers who have already compromised an account with elevated rights, but this does not eliminate the risk, as privilege escalation is a common attack step. The absence of known exploits in the wild provides a window for proactive mitigation, but organizations should not delay remediation. The medium severity rating reflects the balance between the potential impact and the exploitation complexity.
Mitigation Recommendations
To mitigate CVE-2025-11674 effectively, European organizations should: 1) Apply vendor patches immediately once available; since no patch links are currently provided, maintain close contact with PiExtract for updates. 2) Restrict network access to SOOP-CLM servers, especially limiting outbound requests from these servers to only trusted destinations to reduce SSRF exploitation scope. 3) Implement strict input validation and sanitization on any user-controllable parameters that influence server-side requests to prevent malicious request injection. 4) Employ network segmentation to isolate SOOP-CLM servers from sensitive internal systems, minimizing the impact of internal network probing. 5) Monitor logs and network traffic for unusual or unexpected server requests that could indicate SSRF attempts. 6) Enforce the principle of least privilege rigorously to reduce the number of users with high privileges capable of exploiting this vulnerability. 7) Conduct regular security assessments and penetration testing focused on SSRF and related vulnerabilities in SOOP-CLM deployments. 8) Consider deploying Web Application Firewalls (WAFs) with SSRF detection capabilities to provide an additional layer of defense.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-11674: CWE-918 Server-Side Request Forgery (SSRF) in PiExtract SOOP-CLM
Description
SOOP-CLM developed by PiExtract has a Server-Side Request Forgery vulnerability, allowing privileged remote attackers to read server files or probe internal network information.
AI-Powered Analysis
Technical Analysis
CVE-2025-11674 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, affecting PiExtract's SOOP-CLM software versions 5.2 and 5.3. SSRF vulnerabilities occur when an attacker can abuse a server's functionality to send crafted requests from the server itself to internal or external systems that the attacker cannot directly access. In this case, the vulnerability allows privileged remote attackers to coerce the SOOP-CLM server into making unauthorized requests, which can lead to reading sensitive files on the server or probing internal network resources that are otherwise inaccessible externally. The vulnerability requires the attacker to have high privileges on the system, but does not require user interaction, making exploitation feasible once access is obtained. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), high privileges required (PR:H), no user interaction (UI:N), and high impact on confidentiality (VC:H) with no impact on integrity or availability. This suggests that the primary risk is unauthorized disclosure of sensitive information rather than disruption or modification of data. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. However, the vulnerability poses a significant risk for internal reconnaissance and data leakage within affected environments. SOOP-CLM is a contract lifecycle management product, often used in enterprise environments, which may contain sensitive contractual and organizational data, increasing the potential impact of this vulnerability.
Potential Impact
For European organizations, the impact of CVE-2025-11674 can be substantial, especially for those relying on SOOP-CLM for managing sensitive contracts and internal workflows. Exploitation could lead to unauthorized disclosure of confidential contract details, intellectual property, or internal network architecture. This could facilitate further attacks such as lateral movement, privilege escalation, or targeted espionage. Organizations in regulated sectors such as finance, healthcare, and government may face compliance violations and reputational damage if sensitive data is exposed. Additionally, internal network probing could reveal critical infrastructure components, increasing the risk of subsequent attacks. The requirement for high privileges to exploit somewhat limits the threat to insiders or attackers who have already compromised an account with elevated rights, but this does not eliminate the risk, as privilege escalation is a common attack step. The absence of known exploits in the wild provides a window for proactive mitigation, but organizations should not delay remediation. The medium severity rating reflects the balance between the potential impact and the exploitation complexity.
Mitigation Recommendations
To mitigate CVE-2025-11674 effectively, European organizations should: 1) Apply vendor patches immediately once available; since no patch links are currently provided, maintain close contact with PiExtract for updates. 2) Restrict network access to SOOP-CLM servers, especially limiting outbound requests from these servers to only trusted destinations to reduce SSRF exploitation scope. 3) Implement strict input validation and sanitization on any user-controllable parameters that influence server-side requests to prevent malicious request injection. 4) Employ network segmentation to isolate SOOP-CLM servers from sensitive internal systems, minimizing the impact of internal network probing. 5) Monitor logs and network traffic for unusual or unexpected server requests that could indicate SSRF attempts. 6) Enforce the principle of least privilege rigorously to reduce the number of users with high privileges capable of exploiting this vulnerability. 7) Conduct regular security assessments and penetration testing focused on SSRF and related vulnerabilities in SOOP-CLM deployments. 8) Consider deploying Web Application Firewalls (WAFs) with SSRF detection capabilities to provide an additional layer of defense.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- twcert
- Date Reserved
- 2025-10-13T05:59:30.569Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ecb62b5296f0f080308ce1
Added to database: 10/13/2025, 8:19:55 AM
Last enriched: 10/21/2025, 12:49:44 AM
Last updated: 12/5/2025, 1:49:32 AM
Views: 91
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62223: CWE-451: User Interface (UI) Misrepresentation of Critical Information in Microsoft Microsoft Edge (Chromium-based)
MediumCVE-2025-14052: Improper Access Controls in youlaitech youlai-mall
MediumCVE-2025-13373: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Advantech iView
HighCVE-2025-66564: CWE-405: Asymmetric Resource Consumption (Amplification) in sigstore timestamp-authority
HighCVE-2025-66559: CWE-129: Improper Validation of Array Index in taikoxyz taiko-mono
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.