CVE-2025-13174: Server-Side Request Forgery in rachelos WeRSS we-mp-rss
A weakness has been identified in rachelos WeRSS we-mp-rss up to 1.4.7. Affected by this vulnerability is the function do_job of the file /rachelos/we-mp-rss/blob/main/jobs/mps.py of the component Webhook Module. Executing manipulation of the argument web_hook_url can lead to server-side request forgery. The attack may be launched remotely. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
CVE-2025-13174 identifies a server-side request forgery vulnerability in the rachelos WeRSS we-mp-rss software, specifically affecting versions 1.4.0 through 1.4.7. The vulnerability resides in the do_job function within the Webhook Module (file: /rachelos/we-mp-rss/blob/main/jobs/mps.py). The flaw arises from insufficient validation or sanitization of the web_hook_url argument, which an attacker can manipulate to coerce the server into making arbitrary HTTP requests. This SSRF can be exploited remotely without requiring authentication or user interaction, enabling attackers to potentially access internal resources, scan internal networks, or interact with services that are otherwise inaccessible externally. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no user interaction, and partial impacts on confidentiality, integrity, and availability. Although no public exploit code has been observed in the wild, the exploit has been publicly disclosed, increasing the risk of future exploitation. The vulnerability does not directly affect system components beyond the webhook functionality but can be leveraged as a pivot point for further attacks. The absence of patches at the time of disclosure necessitates immediate mitigation efforts by affected users.
Potential Impact
For European organizations, this SSRF vulnerability poses a moderate risk. Attackers exploiting this flaw could leverage the server to access internal network services, potentially exposing sensitive internal APIs, databases, or cloud metadata services. This could lead to information disclosure, unauthorized actions within internal systems, or lateral movement inside corporate networks. Organizations relying on rachelos WeRSS for webhook integrations in critical infrastructure, financial services, or government sectors may face increased risk due to the strategic value of internal resources. The medium CVSS score reflects that while the vulnerability is exploitable remotely without authentication, the impact is somewhat limited by the partial confidentiality, integrity, and availability impacts. However, the ability to perform SSRF attacks can be a stepping stone for more severe attacks, especially in complex enterprise environments. European entities with strict data protection regulations (e.g., GDPR) must consider potential compliance implications if internal data is exposed. The lack of known active exploitation reduces immediate threat but does not eliminate future risk, especially as exploit code is publicly available.
Mitigation Recommendations
To mitigate CVE-2025-13174, European organizations should implement the following specific measures: 1) Immediately audit and restrict outbound HTTP requests from servers running affected WeRSS versions, using network-level controls such as firewall rules or proxy filtering to block unauthorized destinations, especially internal IP ranges and sensitive endpoints. 2) Implement strict validation and sanitization of webhook URLs within the application configuration or custom code to ensure only trusted, whitelisted URLs are accepted. 3) Monitor logs for unusual outbound request patterns originating from the webhook module to detect potential exploitation attempts. 4) Isolate the WeRSS server in a segmented network zone with minimal access to internal resources to limit SSRF impact. 5) Engage with the vendor or community to obtain and apply patches or updates as soon as they become available. 6) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SSRF attack patterns targeting webhook endpoints. 7) Educate development and operations teams about SSRF risks and secure webhook handling best practices to prevent recurrence. These targeted actions go beyond generic advice by focusing on controlling outbound traffic, validating inputs, and network segmentation specific to the nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-13174: Server-Side Request Forgery in rachelos WeRSS we-mp-rss
Description
A weakness has been identified in rachelos WeRSS we-mp-rss up to 1.4.7. Affected by this vulnerability is the function do_job of the file /rachelos/we-mp-rss/blob/main/jobs/mps.py of the component Webhook Module. Executing manipulation of the argument web_hook_url can lead to server-side request forgery. The attack may be launched remotely. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-13174 identifies a server-side request forgery vulnerability in the rachelos WeRSS we-mp-rss software, specifically affecting versions 1.4.0 through 1.4.7. The vulnerability resides in the do_job function within the Webhook Module (file: /rachelos/we-mp-rss/blob/main/jobs/mps.py). The flaw arises from insufficient validation or sanitization of the web_hook_url argument, which an attacker can manipulate to coerce the server into making arbitrary HTTP requests. This SSRF can be exploited remotely without requiring authentication or user interaction, enabling attackers to potentially access internal resources, scan internal networks, or interact with services that are otherwise inaccessible externally. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no user interaction, and partial impacts on confidentiality, integrity, and availability. Although no public exploit code has been observed in the wild, the exploit has been publicly disclosed, increasing the risk of future exploitation. The vulnerability does not directly affect system components beyond the webhook functionality but can be leveraged as a pivot point for further attacks. The absence of patches at the time of disclosure necessitates immediate mitigation efforts by affected users.
Potential Impact
For European organizations, this SSRF vulnerability poses a moderate risk. Attackers exploiting this flaw could leverage the server to access internal network services, potentially exposing sensitive internal APIs, databases, or cloud metadata services. This could lead to information disclosure, unauthorized actions within internal systems, or lateral movement inside corporate networks. Organizations relying on rachelos WeRSS for webhook integrations in critical infrastructure, financial services, or government sectors may face increased risk due to the strategic value of internal resources. The medium CVSS score reflects that while the vulnerability is exploitable remotely without authentication, the impact is somewhat limited by the partial confidentiality, integrity, and availability impacts. However, the ability to perform SSRF attacks can be a stepping stone for more severe attacks, especially in complex enterprise environments. European entities with strict data protection regulations (e.g., GDPR) must consider potential compliance implications if internal data is exposed. The lack of known active exploitation reduces immediate threat but does not eliminate future risk, especially as exploit code is publicly available.
Mitigation Recommendations
To mitigate CVE-2025-13174, European organizations should implement the following specific measures: 1) Immediately audit and restrict outbound HTTP requests from servers running affected WeRSS versions, using network-level controls such as firewall rules or proxy filtering to block unauthorized destinations, especially internal IP ranges and sensitive endpoints. 2) Implement strict validation and sanitization of webhook URLs within the application configuration or custom code to ensure only trusted, whitelisted URLs are accepted. 3) Monitor logs for unusual outbound request patterns originating from the webhook module to detect potential exploitation attempts. 4) Isolate the WeRSS server in a segmented network zone with minimal access to internal resources to limit SSRF impact. 5) Engage with the vendor or community to obtain and apply patches or updates as soon as they become available. 6) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SSRF attack patterns targeting webhook endpoints. 7) Educate development and operations teams about SSRF risks and secure webhook handling best practices to prevent recurrence. These targeted actions go beyond generic advice by focusing on controlling outbound traffic, validating inputs, and network segmentation specific to the nature of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-14T10:18:04.575Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691779316b210bb35bbae6f0
Added to database: 11/14/2025, 6:47:13 PM
Last enriched: 11/14/2025, 7:02:40 PM
Last updated: 11/15/2025, 7:19:38 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12849: CWE-862 Missing Authorization in contest-gallery Contest Gallery – Upload, Vote & Sell with PayPal and Stripe
MediumCVE-2025-13190: Stack-based Buffer Overflow in D-Link DIR-816L
HighCVE-2025-13189: Stack-based Buffer Overflow in D-Link DIR-816L
HighCVE-2025-8994: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wedevs Project Management & Task Manager with Kanban Board & Gantt Chart – WP Project Manager
MediumCVE-2025-12847: CWE-862 Missing Authorization in smub All in One SEO – Powerful SEO Plugin to Boost SEO Rankings & Increase Traffic
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.