Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13174: Server-Side Request Forgery in rachelos WeRSS we-mp-rss

0
Medium
VulnerabilityCVE-2025-13174cvecve-2025-13174
Published: Fri Nov 14 2025 (11/14/2025, 18:32:06 UTC)
Source: CVE Database V5
Vendor/Project: rachelos
Product: WeRSS we-mp-rss

Description

A weakness has been identified in rachelos WeRSS we-mp-rss up to 1.4.7. Affected by this vulnerability is the function do_job of the file /rachelos/we-mp-rss/blob/main/jobs/mps.py of the component Webhook Module. Executing manipulation of the argument web_hook_url can lead to server-side request forgery. The attack may be launched remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 11/14/2025, 19:02:40 UTC

Technical Analysis

CVE-2025-13174 identifies a server-side request forgery vulnerability in the rachelos WeRSS we-mp-rss software, specifically affecting versions 1.4.0 through 1.4.7. The vulnerability resides in the do_job function within the Webhook Module (file: /rachelos/we-mp-rss/blob/main/jobs/mps.py). The flaw arises from insufficient validation or sanitization of the web_hook_url argument, which an attacker can manipulate to coerce the server into making arbitrary HTTP requests. This SSRF can be exploited remotely without requiring authentication or user interaction, enabling attackers to potentially access internal resources, scan internal networks, or interact with services that are otherwise inaccessible externally. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no user interaction, and partial impacts on confidentiality, integrity, and availability. Although no public exploit code has been observed in the wild, the exploit has been publicly disclosed, increasing the risk of future exploitation. The vulnerability does not directly affect system components beyond the webhook functionality but can be leveraged as a pivot point for further attacks. The absence of patches at the time of disclosure necessitates immediate mitigation efforts by affected users.

Potential Impact

For European organizations, this SSRF vulnerability poses a moderate risk. Attackers exploiting this flaw could leverage the server to access internal network services, potentially exposing sensitive internal APIs, databases, or cloud metadata services. This could lead to information disclosure, unauthorized actions within internal systems, or lateral movement inside corporate networks. Organizations relying on rachelos WeRSS for webhook integrations in critical infrastructure, financial services, or government sectors may face increased risk due to the strategic value of internal resources. The medium CVSS score reflects that while the vulnerability is exploitable remotely without authentication, the impact is somewhat limited by the partial confidentiality, integrity, and availability impacts. However, the ability to perform SSRF attacks can be a stepping stone for more severe attacks, especially in complex enterprise environments. European entities with strict data protection regulations (e.g., GDPR) must consider potential compliance implications if internal data is exposed. The lack of known active exploitation reduces immediate threat but does not eliminate future risk, especially as exploit code is publicly available.

Mitigation Recommendations

To mitigate CVE-2025-13174, European organizations should implement the following specific measures: 1) Immediately audit and restrict outbound HTTP requests from servers running affected WeRSS versions, using network-level controls such as firewall rules or proxy filtering to block unauthorized destinations, especially internal IP ranges and sensitive endpoints. 2) Implement strict validation and sanitization of webhook URLs within the application configuration or custom code to ensure only trusted, whitelisted URLs are accepted. 3) Monitor logs for unusual outbound request patterns originating from the webhook module to detect potential exploitation attempts. 4) Isolate the WeRSS server in a segmented network zone with minimal access to internal resources to limit SSRF impact. 5) Engage with the vendor or community to obtain and apply patches or updates as soon as they become available. 6) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SSRF attack patterns targeting webhook endpoints. 7) Educate development and operations teams about SSRF risks and secure webhook handling best practices to prevent recurrence. These targeted actions go beyond generic advice by focusing on controlling outbound traffic, validating inputs, and network segmentation specific to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-14T10:18:04.575Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691779316b210bb35bbae6f0

Added to database: 11/14/2025, 6:47:13 PM

Last enriched: 11/14/2025, 7:02:40 PM

Last updated: 11/15/2025, 7:19:38 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats