Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13796: Server-Side Request Forgery in deco-cx apps

0
Medium
VulnerabilityCVE-2025-13796cvecve-2025-13796
Published: Sun Nov 30 2025 (11/30/2025, 23:32:06 UTC)
Source: CVE Database V5
Vendor/Project: deco-cx
Product: apps

Description

A security vulnerability has been detected in deco-cx apps up to 0.120.1. Affected by this vulnerability is the function AnalyticsScript of the file website/loaders/analyticsScript.ts of the component Parameter Handler. Such manipulation of the argument url leads to server-side request forgery. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 0.120.2 addresses this issue. It is suggested to upgrade the affected component.

AI-Powered Analysis

AILast updated: 11/30/2025, 23:46:10 UTC

Technical Analysis

CVE-2025-13796 is a Server-Side Request Forgery (SSRF) vulnerability identified in the deco-cx apps product, specifically in versions 0.120.0 and 0.120.1. The vulnerability resides in the AnalyticsScript function of the file website/loaders/analyticsScript.ts within the Parameter Handler component. The flaw arises from insufficient validation or sanitization of the url parameter, which an attacker can manipulate to coerce the server into making arbitrary HTTP requests. SSRF vulnerabilities allow attackers to bypass network access controls by leveraging the vulnerable server as a proxy to access internal or external resources that would otherwise be inaccessible. The attack vector is remote and does not require authentication or user interaction, increasing the risk of exploitation. The CVSS 4.0 base score is 5.3, reflecting a medium severity level due to the ease of exploitation (low attack complexity), no privileges required, and no user interaction, but with limited impact on confidentiality, integrity, and availability (low impact on all three). The vulnerability has been publicly disclosed, though no active exploitation has been reported. The vendor has released version 0.120.2 of deco-cx apps to address this issue, recommending immediate upgrade to remediate the vulnerability.

Potential Impact

For European organizations, exploitation of this SSRF vulnerability could lead to unauthorized internal network scanning, access to sensitive internal services, or indirect data exfiltration. This is particularly concerning for organizations with segmented networks or sensitive internal APIs that rely on network-level access controls. Attackers could leverage the SSRF to pivot into internal systems, potentially bypassing perimeter defenses. While the direct impact on confidentiality, integrity, and availability is rated low, the SSRF can serve as a stepping stone for more severe attacks, such as accessing metadata services in cloud environments or exploiting other internal vulnerabilities. Organizations in sectors with strict data protection requirements (e.g., finance, healthcare, government) may face compliance risks if internal data is exposed. The medium severity rating suggests that while immediate damage may be limited, the vulnerability should be addressed promptly to avoid escalation.

Mitigation Recommendations

The primary mitigation is to upgrade deco-cx apps to version 0.120.2 or later, which contains the patch for this vulnerability. Beyond patching, organizations should implement strict input validation and sanitization for all URL parameters to prevent SSRF. Network-level controls should be enforced to restrict the server's ability to make outbound requests to only necessary destinations, using egress filtering and firewall rules. Deploying web application firewalls (WAFs) with SSRF detection capabilities can help detect and block suspicious request patterns. Monitoring and logging outbound requests from the server can provide early detection of exploitation attempts. Additionally, internal services should be hardened and require authentication to mitigate risks if SSRF is exploited. Regular security assessments and code reviews focusing on input handling can prevent similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-30T13:54:14.862Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692cd729c368b5914d210412

Added to database: 11/30/2025, 11:45:45 PM

Last enriched: 11/30/2025, 11:46:10 PM

Last updated: 12/4/2025, 9:01:55 PM

Views: 101

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats