CVE-2025-11674: CWE-918 Server-Side Request Forgery (SSRF) in PiExtract SOOP-CLM
SOOP-CLM developed by PiExtract has a Server-Side Request Forgery vulnerability, allowing privileged remote attackers to read server files or probe internal network information.
AI Analysis
Technical Summary
CVE-2025-11674 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, affecting PiExtract's SOOP-CLM product versions 5.2 and 5.3. SSRF vulnerabilities occur when an attacker can manipulate a server to send crafted requests to internal or external systems that the server can access, bypassing normal access controls. In this case, the vulnerability allows privileged remote attackers to coerce the SOOP-CLM server into reading sensitive files or probing internal network resources, which could reveal confidential information or facilitate further attacks. The vulnerability requires the attacker to have high privileges on the system but does not require user interaction, increasing the risk of automated exploitation in trusted environments. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), but privileges required (PR:H), no user interaction (UI:N), and high impact on confidentiality (VC:H) with no impact on integrity or availability. This suggests the primary risk is unauthorized data disclosure rather than system disruption or data modification. No patches or known exploits are currently available, but the vulnerability's presence in widely used versions necessitates proactive mitigation. The SSRF can be leveraged to access internal-only services, potentially exposing sensitive internal APIs or configuration files, which could be a stepping stone for lateral movement within an organization’s network.
Potential Impact
For European organizations, the impact of CVE-2025-11674 can be significant, especially for those relying on SOOP-CLM for critical lifecycle management processes. The ability to read server files or probe internal networks can lead to exposure of sensitive corporate data, intellectual property, or internal infrastructure details. This can facilitate further targeted attacks such as lateral movement, privilege escalation, or data exfiltration. Sectors such as finance, manufacturing, and government agencies using SOOP-CLM may face increased risk of espionage or operational disruption. The vulnerability’s requirement for high privileges limits exposure to insider threats or attackers who have already compromised an account, but once exploited, it can undermine network segmentation and internal security controls. Given the interconnected nature of European enterprise networks and regulatory requirements like GDPR, unauthorized data disclosure could also result in compliance violations and financial penalties.
Mitigation Recommendations
To mitigate CVE-2025-11674, organizations should first verify if they are running affected SOOP-CLM versions 5.2 or 5.3 and prioritize upgrading to patched versions once available. In the absence of patches, implement strict input validation and sanitization on any user-controllable parameters that influence server requests to prevent SSRF payloads. Restrict outbound server requests through network-level controls such as firewall rules or proxy configurations to limit the server’s ability to reach internal or sensitive endpoints. Employ network segmentation to isolate critical internal services from the SOOP-CLM server. Monitor logs for unusual outbound requests or access patterns indicative of SSRF exploitation attempts. Additionally, enforce the principle of least privilege to reduce the number of users with high privileges on the SOOP-CLM system. Conduct regular security assessments and penetration testing focused on SSRF vectors to identify and remediate weaknesses proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-11674: CWE-918 Server-Side Request Forgery (SSRF) in PiExtract SOOP-CLM
Description
SOOP-CLM developed by PiExtract has a Server-Side Request Forgery vulnerability, allowing privileged remote attackers to read server files or probe internal network information.
AI-Powered Analysis
Technical Analysis
CVE-2025-11674 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, affecting PiExtract's SOOP-CLM product versions 5.2 and 5.3. SSRF vulnerabilities occur when an attacker can manipulate a server to send crafted requests to internal or external systems that the server can access, bypassing normal access controls. In this case, the vulnerability allows privileged remote attackers to coerce the SOOP-CLM server into reading sensitive files or probing internal network resources, which could reveal confidential information or facilitate further attacks. The vulnerability requires the attacker to have high privileges on the system but does not require user interaction, increasing the risk of automated exploitation in trusted environments. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), but privileges required (PR:H), no user interaction (UI:N), and high impact on confidentiality (VC:H) with no impact on integrity or availability. This suggests the primary risk is unauthorized data disclosure rather than system disruption or data modification. No patches or known exploits are currently available, but the vulnerability's presence in widely used versions necessitates proactive mitigation. The SSRF can be leveraged to access internal-only services, potentially exposing sensitive internal APIs or configuration files, which could be a stepping stone for lateral movement within an organization’s network.
Potential Impact
For European organizations, the impact of CVE-2025-11674 can be significant, especially for those relying on SOOP-CLM for critical lifecycle management processes. The ability to read server files or probe internal networks can lead to exposure of sensitive corporate data, intellectual property, or internal infrastructure details. This can facilitate further targeted attacks such as lateral movement, privilege escalation, or data exfiltration. Sectors such as finance, manufacturing, and government agencies using SOOP-CLM may face increased risk of espionage or operational disruption. The vulnerability’s requirement for high privileges limits exposure to insider threats or attackers who have already compromised an account, but once exploited, it can undermine network segmentation and internal security controls. Given the interconnected nature of European enterprise networks and regulatory requirements like GDPR, unauthorized data disclosure could also result in compliance violations and financial penalties.
Mitigation Recommendations
To mitigate CVE-2025-11674, organizations should first verify if they are running affected SOOP-CLM versions 5.2 or 5.3 and prioritize upgrading to patched versions once available. In the absence of patches, implement strict input validation and sanitization on any user-controllable parameters that influence server requests to prevent SSRF payloads. Restrict outbound server requests through network-level controls such as firewall rules or proxy configurations to limit the server’s ability to reach internal or sensitive endpoints. Employ network segmentation to isolate critical internal services from the SOOP-CLM server. Monitor logs for unusual outbound requests or access patterns indicative of SSRF exploitation attempts. Additionally, enforce the principle of least privilege to reduce the number of users with high privileges on the SOOP-CLM system. Conduct regular security assessments and penetration testing focused on SSRF vectors to identify and remediate weaknesses proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- twcert
- Date Reserved
- 2025-10-13T05:59:30.569Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ecb62b5296f0f080308ce1
Added to database: 10/13/2025, 8:19:55 AM
Last enriched: 10/13/2025, 8:20:07 AM
Last updated: 10/13/2025, 10:36:42 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10720: CWE-639 Authorization Bypass Through User-Controlled Key in WP Private Content Plus
HighCVE-2025-9337: CWE-476 NULL Pointer Dereference in ASUS Armoury Crate
MediumCVE-2025-9336: CWE-121 - Stack-based Buffer Overflow in ASUS Armoury Crate
MediumCVE-2025-11184: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in qwc-services qwc-registration-gui
MediumCVE-2025-11183: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in QGIS QWC2
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.