CVE-2025-13796: Server-Side Request Forgery in deco-cx apps
A security vulnerability has been detected in deco-cx apps up to 0.120.1. Affected by this vulnerability is the function AnalyticsScript of the file website/loaders/analyticsScript.ts of the component Parameter Handler. Such manipulation of the argument url leads to server-side request forgery. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 0.120.2 addresses this issue. It is suggested to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2025-13796 is a Server-Side Request Forgery (SSRF) vulnerability identified in the deco-cx apps product, specifically in versions 0.120.0 and 0.120.1. The vulnerability resides in the AnalyticsScript function of the file website/loaders/analyticsScript.ts within the Parameter Handler component. The flaw arises from insufficient validation or sanitization of the url parameter, which an attacker can manipulate to coerce the server into making arbitrary HTTP requests. SSRF vulnerabilities allow attackers to bypass network access controls by leveraging the vulnerable server as a proxy to access internal or external resources that would otherwise be inaccessible. The attack vector is remote and does not require authentication or user interaction, increasing the risk of exploitation. The CVSS 4.0 base score is 5.3, reflecting a medium severity level due to the ease of exploitation (low attack complexity), no privileges required, and no user interaction, but with limited impact on confidentiality, integrity, and availability (low impact on all three). The vulnerability has been publicly disclosed, though no active exploitation has been reported. The vendor has released version 0.120.2 of deco-cx apps to address this issue, recommending immediate upgrade to remediate the vulnerability.
Potential Impact
For European organizations, exploitation of this SSRF vulnerability could lead to unauthorized internal network scanning, access to sensitive internal services, or indirect data exfiltration. This is particularly concerning for organizations with segmented networks or sensitive internal APIs that rely on network-level access controls. Attackers could leverage the SSRF to pivot into internal systems, potentially bypassing perimeter defenses. While the direct impact on confidentiality, integrity, and availability is rated low, the SSRF can serve as a stepping stone for more severe attacks, such as accessing metadata services in cloud environments or exploiting other internal vulnerabilities. Organizations in sectors with strict data protection requirements (e.g., finance, healthcare, government) may face compliance risks if internal data is exposed. The medium severity rating suggests that while immediate damage may be limited, the vulnerability should be addressed promptly to avoid escalation.
Mitigation Recommendations
The primary mitigation is to upgrade deco-cx apps to version 0.120.2 or later, which contains the patch for this vulnerability. Beyond patching, organizations should implement strict input validation and sanitization for all URL parameters to prevent SSRF. Network-level controls should be enforced to restrict the server's ability to make outbound requests to only necessary destinations, using egress filtering and firewall rules. Deploying web application firewalls (WAFs) with SSRF detection capabilities can help detect and block suspicious request patterns. Monitoring and logging outbound requests from the server can provide early detection of exploitation attempts. Additionally, internal services should be hardened and require authentication to mitigate risks if SSRF is exploited. Regular security assessments and code reviews focusing on input handling can prevent similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-13796: Server-Side Request Forgery in deco-cx apps
Description
A security vulnerability has been detected in deco-cx apps up to 0.120.1. Affected by this vulnerability is the function AnalyticsScript of the file website/loaders/analyticsScript.ts of the component Parameter Handler. Such manipulation of the argument url leads to server-side request forgery. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 0.120.2 addresses this issue. It is suggested to upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2025-13796 is a Server-Side Request Forgery (SSRF) vulnerability identified in the deco-cx apps product, specifically in versions 0.120.0 and 0.120.1. The vulnerability resides in the AnalyticsScript function of the file website/loaders/analyticsScript.ts within the Parameter Handler component. The flaw arises from insufficient validation or sanitization of the url parameter, which an attacker can manipulate to coerce the server into making arbitrary HTTP requests. SSRF vulnerabilities allow attackers to bypass network access controls by leveraging the vulnerable server as a proxy to access internal or external resources that would otherwise be inaccessible. The attack vector is remote and does not require authentication or user interaction, increasing the risk of exploitation. The CVSS 4.0 base score is 5.3, reflecting a medium severity level due to the ease of exploitation (low attack complexity), no privileges required, and no user interaction, but with limited impact on confidentiality, integrity, and availability (low impact on all three). The vulnerability has been publicly disclosed, though no active exploitation has been reported. The vendor has released version 0.120.2 of deco-cx apps to address this issue, recommending immediate upgrade to remediate the vulnerability.
Potential Impact
For European organizations, exploitation of this SSRF vulnerability could lead to unauthorized internal network scanning, access to sensitive internal services, or indirect data exfiltration. This is particularly concerning for organizations with segmented networks or sensitive internal APIs that rely on network-level access controls. Attackers could leverage the SSRF to pivot into internal systems, potentially bypassing perimeter defenses. While the direct impact on confidentiality, integrity, and availability is rated low, the SSRF can serve as a stepping stone for more severe attacks, such as accessing metadata services in cloud environments or exploiting other internal vulnerabilities. Organizations in sectors with strict data protection requirements (e.g., finance, healthcare, government) may face compliance risks if internal data is exposed. The medium severity rating suggests that while immediate damage may be limited, the vulnerability should be addressed promptly to avoid escalation.
Mitigation Recommendations
The primary mitigation is to upgrade deco-cx apps to version 0.120.2 or later, which contains the patch for this vulnerability. Beyond patching, organizations should implement strict input validation and sanitization for all URL parameters to prevent SSRF. Network-level controls should be enforced to restrict the server's ability to make outbound requests to only necessary destinations, using egress filtering and firewall rules. Deploying web application firewalls (WAFs) with SSRF detection capabilities can help detect and block suspicious request patterns. Monitoring and logging outbound requests from the server can provide early detection of exploitation attempts. Additionally, internal services should be hardened and require authentication to mitigate risks if SSRF is exploited. Regular security assessments and code reviews focusing on input handling can prevent similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-30T13:54:14.862Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692cd729c368b5914d210412
Added to database: 11/30/2025, 11:45:45 PM
Last enriched: 11/30/2025, 11:46:10 PM
Last updated: 12/4/2025, 9:01:55 PM
Views: 101
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66573: CWE-319 Cleartext Transmission of Sensitive Information in mersive Solstice Pod API Session Key Extraction via API Endpoint
MediumCVE-2025-66572: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in loadedcommerce Loaded Commerce
MediumCVE-2025-66571: CWE-502: Deserialization of Untrusted Data in UNA CMS
CriticalCVE-2025-66555: CWE-306: Missing Authentication for Critical Function in airkeyboardapp AirKeyboard iOS App
HighCVE-2025-63896: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.