Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11674: CWE-918 Server-Side Request Forgery (SSRF) in PiExtract SOOP-CLM

0
Medium
VulnerabilityCVE-2025-11674cvecve-2025-11674cwe-918
Published: Mon Oct 13 2025 (10/13/2025, 07:44:41 UTC)
Source: CVE Database V5
Vendor/Project: PiExtract
Product: SOOP-CLM

Description

SOOP-CLM developed by PiExtract has a Server-Side Request Forgery vulnerability, allowing privileged remote attackers to read server files or probe internal network information.

AI-Powered Analysis

AILast updated: 10/13/2025, 08:20:07 UTC

Technical Analysis

CVE-2025-11674 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, affecting PiExtract's SOOP-CLM product versions 5.2 and 5.3. SSRF vulnerabilities occur when an attacker can manipulate a server to send crafted requests to internal or external systems that the server can access, bypassing normal access controls. In this case, the vulnerability allows privileged remote attackers to coerce the SOOP-CLM server into reading sensitive files or probing internal network resources, which could reveal confidential information or facilitate further attacks. The vulnerability requires the attacker to have high privileges on the system but does not require user interaction, increasing the risk of automated exploitation in trusted environments. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), but privileges required (PR:H), no user interaction (UI:N), and high impact on confidentiality (VC:H) with no impact on integrity or availability. This suggests the primary risk is unauthorized data disclosure rather than system disruption or data modification. No patches or known exploits are currently available, but the vulnerability's presence in widely used versions necessitates proactive mitigation. The SSRF can be leveraged to access internal-only services, potentially exposing sensitive internal APIs or configuration files, which could be a stepping stone for lateral movement within an organization’s network.

Potential Impact

For European organizations, the impact of CVE-2025-11674 can be significant, especially for those relying on SOOP-CLM for critical lifecycle management processes. The ability to read server files or probe internal networks can lead to exposure of sensitive corporate data, intellectual property, or internal infrastructure details. This can facilitate further targeted attacks such as lateral movement, privilege escalation, or data exfiltration. Sectors such as finance, manufacturing, and government agencies using SOOP-CLM may face increased risk of espionage or operational disruption. The vulnerability’s requirement for high privileges limits exposure to insider threats or attackers who have already compromised an account, but once exploited, it can undermine network segmentation and internal security controls. Given the interconnected nature of European enterprise networks and regulatory requirements like GDPR, unauthorized data disclosure could also result in compliance violations and financial penalties.

Mitigation Recommendations

To mitigate CVE-2025-11674, organizations should first verify if they are running affected SOOP-CLM versions 5.2 or 5.3 and prioritize upgrading to patched versions once available. In the absence of patches, implement strict input validation and sanitization on any user-controllable parameters that influence server requests to prevent SSRF payloads. Restrict outbound server requests through network-level controls such as firewall rules or proxy configurations to limit the server’s ability to reach internal or sensitive endpoints. Employ network segmentation to isolate critical internal services from the SOOP-CLM server. Monitor logs for unusual outbound requests or access patterns indicative of SSRF exploitation attempts. Additionally, enforce the principle of least privilege to reduce the number of users with high privileges on the SOOP-CLM system. Conduct regular security assessments and penetration testing focused on SSRF vectors to identify and remediate weaknesses proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
twcert
Date Reserved
2025-10-13T05:59:30.569Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ecb62b5296f0f080308ce1

Added to database: 10/13/2025, 8:19:55 AM

Last enriched: 10/13/2025, 8:20:07 AM

Last updated: 10/13/2025, 10:36:42 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats