Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11674: CWE-918 Server-Side Request Forgery (SSRF) in PiExtract SOOP-CLM

0
Medium
VulnerabilityCVE-2025-11674cvecve-2025-11674cwe-918
Published: Mon Oct 13 2025 (10/13/2025, 07:44:41 UTC)
Source: CVE Database V5
Vendor/Project: PiExtract
Product: SOOP-CLM

Description

SOOP-CLM developed by PiExtract has a Server-Side Request Forgery vulnerability, allowing privileged remote attackers to read server files or probe internal network information.

AI-Powered Analysis

AILast updated: 10/21/2025, 00:49:44 UTC

Technical Analysis

CVE-2025-11674 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, affecting PiExtract's SOOP-CLM software versions 5.2 and 5.3. SSRF vulnerabilities occur when an attacker can abuse a server's functionality to send crafted requests from the server itself to internal or external systems that the attacker cannot directly access. In this case, the vulnerability allows privileged remote attackers to coerce the SOOP-CLM server into making unauthorized requests, which can lead to reading sensitive files on the server or probing internal network resources that are otherwise inaccessible externally. The vulnerability requires the attacker to have high privileges on the system, but does not require user interaction, making exploitation feasible once access is obtained. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), high privileges required (PR:H), no user interaction (UI:N), and high impact on confidentiality (VC:H) with no impact on integrity or availability. This suggests that the primary risk is unauthorized disclosure of sensitive information rather than disruption or modification of data. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. However, the vulnerability poses a significant risk for internal reconnaissance and data leakage within affected environments. SOOP-CLM is a contract lifecycle management product, often used in enterprise environments, which may contain sensitive contractual and organizational data, increasing the potential impact of this vulnerability.

Potential Impact

For European organizations, the impact of CVE-2025-11674 can be substantial, especially for those relying on SOOP-CLM for managing sensitive contracts and internal workflows. Exploitation could lead to unauthorized disclosure of confidential contract details, intellectual property, or internal network architecture. This could facilitate further attacks such as lateral movement, privilege escalation, or targeted espionage. Organizations in regulated sectors such as finance, healthcare, and government may face compliance violations and reputational damage if sensitive data is exposed. Additionally, internal network probing could reveal critical infrastructure components, increasing the risk of subsequent attacks. The requirement for high privileges to exploit somewhat limits the threat to insiders or attackers who have already compromised an account with elevated rights, but this does not eliminate the risk, as privilege escalation is a common attack step. The absence of known exploits in the wild provides a window for proactive mitigation, but organizations should not delay remediation. The medium severity rating reflects the balance between the potential impact and the exploitation complexity.

Mitigation Recommendations

To mitigate CVE-2025-11674 effectively, European organizations should: 1) Apply vendor patches immediately once available; since no patch links are currently provided, maintain close contact with PiExtract for updates. 2) Restrict network access to SOOP-CLM servers, especially limiting outbound requests from these servers to only trusted destinations to reduce SSRF exploitation scope. 3) Implement strict input validation and sanitization on any user-controllable parameters that influence server-side requests to prevent malicious request injection. 4) Employ network segmentation to isolate SOOP-CLM servers from sensitive internal systems, minimizing the impact of internal network probing. 5) Monitor logs and network traffic for unusual or unexpected server requests that could indicate SSRF attempts. 6) Enforce the principle of least privilege rigorously to reduce the number of users with high privileges capable of exploiting this vulnerability. 7) Conduct regular security assessments and penetration testing focused on SSRF and related vulnerabilities in SOOP-CLM deployments. 8) Consider deploying Web Application Firewalls (WAFs) with SSRF detection capabilities to provide an additional layer of defense.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
twcert
Date Reserved
2025-10-13T05:59:30.569Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ecb62b5296f0f080308ce1

Added to database: 10/13/2025, 8:19:55 AM

Last enriched: 10/21/2025, 12:49:44 AM

Last updated: 12/5/2025, 1:49:32 AM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats