CVE-2025-13796: Server-Side Request Forgery in deco-cx apps
A security vulnerability has been detected in deco-cx apps up to 0.120.1. Affected by this vulnerability is the function AnalyticsScript of the file website/loaders/analyticsScript.ts of the component Parameter Handler. Such manipulation of the argument url leads to server-side request forgery. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 0.120.2 addresses this issue. It is suggested to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2025-13796 is a server-side request forgery vulnerability identified in the deco-cx apps, specifically in versions 0.120.0 and 0.120.1. The vulnerability resides in the AnalyticsScript function of the website/loaders/analyticsScript.ts file, part of the Parameter Handler component. The issue arises from improper validation or sanitization of the url parameter, which an attacker can manipulate to coerce the server into making arbitrary HTTP requests. These requests can target internal or external systems, potentially exposing sensitive information, bypassing firewalls, or enabling further attacks such as internal network reconnaissance or exploitation of other internal services. The vulnerability can be exploited remotely without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although the impact is rated low on CIA triad components, the ability to perform SSRF can facilitate more severe chained attacks. The vulnerability was publicly disclosed on November 30, 2025, and the vendor has released version 0.120.2 to address the issue. No known active exploits have been reported yet, but public disclosure increases the likelihood of exploitation attempts.
Potential Impact
For European organizations, this SSRF vulnerability poses a moderate risk. Organizations using deco-cx apps in affected versions may have their internal networks probed or sensitive internal services accessed by attackers leveraging the SSRF flaw. This can lead to unauthorized data exposure, internal service disruption, or pivoting to more critical systems. The vulnerability's remote exploitability without authentication means attackers can attempt exploitation over the internet, increasing the attack surface. Industries with sensitive data or critical infrastructure relying on deco-cx apps could face increased risk of data breaches or service interruptions. Additionally, SSRF can be used to bypass network access controls, potentially undermining perimeter defenses. The medium CVSS score reflects these risks, but the actual impact depends on the deployment context and network segmentation practices within organizations.
Mitigation Recommendations
European organizations should immediately upgrade deco-cx apps to version 0.120.2 or later to remediate the vulnerability. In addition to patching, organizations should implement strict input validation and sanitization on all user-controllable parameters, especially URLs used in server-side requests. Network segmentation should be enforced to limit the server's ability to access internal resources unnecessarily. Employing web application firewalls (WAFs) with rules to detect and block SSRF patterns can provide an additional layer of defense. Monitoring and logging of outbound server requests should be enhanced to detect anomalous or unauthorized requests indicative of SSRF exploitation attempts. Organizations should also review and restrict the server's outbound network permissions to only necessary destinations, minimizing the potential impact of SSRF. Regular security assessments and penetration testing targeting SSRF vulnerabilities can help identify residual risks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-13796: Server-Side Request Forgery in deco-cx apps
Description
A security vulnerability has been detected in deco-cx apps up to 0.120.1. Affected by this vulnerability is the function AnalyticsScript of the file website/loaders/analyticsScript.ts of the component Parameter Handler. Such manipulation of the argument url leads to server-side request forgery. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 0.120.2 addresses this issue. It is suggested to upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2025-13796 is a server-side request forgery vulnerability identified in the deco-cx apps, specifically in versions 0.120.0 and 0.120.1. The vulnerability resides in the AnalyticsScript function of the website/loaders/analyticsScript.ts file, part of the Parameter Handler component. The issue arises from improper validation or sanitization of the url parameter, which an attacker can manipulate to coerce the server into making arbitrary HTTP requests. These requests can target internal or external systems, potentially exposing sensitive information, bypassing firewalls, or enabling further attacks such as internal network reconnaissance or exploitation of other internal services. The vulnerability can be exploited remotely without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although the impact is rated low on CIA triad components, the ability to perform SSRF can facilitate more severe chained attacks. The vulnerability was publicly disclosed on November 30, 2025, and the vendor has released version 0.120.2 to address the issue. No known active exploits have been reported yet, but public disclosure increases the likelihood of exploitation attempts.
Potential Impact
For European organizations, this SSRF vulnerability poses a moderate risk. Organizations using deco-cx apps in affected versions may have their internal networks probed or sensitive internal services accessed by attackers leveraging the SSRF flaw. This can lead to unauthorized data exposure, internal service disruption, or pivoting to more critical systems. The vulnerability's remote exploitability without authentication means attackers can attempt exploitation over the internet, increasing the attack surface. Industries with sensitive data or critical infrastructure relying on deco-cx apps could face increased risk of data breaches or service interruptions. Additionally, SSRF can be used to bypass network access controls, potentially undermining perimeter defenses. The medium CVSS score reflects these risks, but the actual impact depends on the deployment context and network segmentation practices within organizations.
Mitigation Recommendations
European organizations should immediately upgrade deco-cx apps to version 0.120.2 or later to remediate the vulnerability. In addition to patching, organizations should implement strict input validation and sanitization on all user-controllable parameters, especially URLs used in server-side requests. Network segmentation should be enforced to limit the server's ability to access internal resources unnecessarily. Employing web application firewalls (WAFs) with rules to detect and block SSRF patterns can provide an additional layer of defense. Monitoring and logging of outbound server requests should be enhanced to detect anomalous or unauthorized requests indicative of SSRF exploitation attempts. Organizations should also review and restrict the server's outbound network permissions to only necessary destinations, minimizing the potential impact of SSRF. Regular security assessments and penetration testing targeting SSRF vulnerabilities can help identify residual risks.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-30T13:54:14.862Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692cd729c368b5914d210412
Added to database: 11/30/2025, 11:45:45 PM
Last enriched: 12/7/2025, 11:57:48 PM
Last updated: 1/18/2026, 4:18:38 PM
Views: 151
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1125: Command Injection in D-Link DIR-823X
MediumCVE-2026-1124: SQL Injection in Yonyou KSOA
MediumCVE-2026-0863: CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
HighCVE-2026-1123: SQL Injection in Yonyou KSOA
MediumCVE-2026-1122: SQL Injection in Yonyou KSOA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.