CVE-2025-13872: CWE-918 Server-Side Request Forgery (SSRF) in ObjectPlanet Opinio
CVE-2025-13872 is a Blind Server-Side Request Forgery (SSRF) vulnerability found in ObjectPlanet Opinio version 7. 26 rev12562. It affects the survey-import feature on web-based platforms, allowing an attacker with high privileges to force the server to perform arbitrary HTTP GET requests to destinations of their choosing. The vulnerability has a low CVSS 4. 0 score of 2. 1 due to high attack complexity and required privileges. No known exploits are currently reported in the wild. While the direct impact is limited, SSRF can be leveraged for internal network reconnaissance or to access restricted resources if combined with other vulnerabilities. European organizations using ObjectPlanet Opinio should assess exposure and restrict server outbound requests where possible. Mitigations include applying vendor patches when available, restricting network egress, and monitoring unusual server request patterns.
AI Analysis
Technical Summary
CVE-2025-13872 is a Blind Server-Side Request Forgery (SSRF) vulnerability identified in ObjectPlanet Opinio version 7.26 rev12562, a web-based survey and polling platform. The flaw exists in the survey-import feature, which improperly validates or sanitizes input URLs used during the import process. An attacker with high privileges on the system can craft malicious import requests that cause the server to issue HTTP GET requests to arbitrary destinations. This SSRF is 'blind' because the attacker does not receive direct response data from the targeted requests, limiting immediate exploitation but still enabling indirect reconnaissance or interaction with internal services. The vulnerability has been assigned a CVSS 4.0 score of 2.1, reflecting its low severity due to the high attack complexity, requirement for privileged access, and lack of user interaction. No public exploits or active exploitation have been reported to date. Despite the low score, SSRF vulnerabilities can be leveraged in chained attacks to pivot into internal networks, access metadata services, or bypass firewalls if the server has broad network access. The lack of available patches at the time of disclosure means organizations must rely on network-level mitigations and monitoring until vendor fixes are released. This vulnerability is cataloged under CWE-918, which covers SSRF issues where servers are tricked into making unintended requests. The affected product, ObjectPlanet Opinio, is used primarily in survey and opinion polling contexts, often by market research firms and public institutions.
Potential Impact
For European organizations, the impact of CVE-2025-13872 is generally low but context-dependent. Since exploitation requires high privileges on the server, the vulnerability does not directly enable remote attackers to gain initial access. However, once an attacker has such access, they can use SSRF to perform internal network reconnaissance, potentially accessing sensitive internal services or data not exposed externally. This can lead to information disclosure or facilitate lateral movement within the network. Organizations handling sensitive survey data or operating in regulated sectors (e.g., government polling agencies, market research firms) could face reputational damage or compliance issues if internal data is exposed. The vulnerability could also be used to bypass network segmentation or firewall rules if the server can reach otherwise restricted endpoints. Given the low CVSS score and lack of known exploits, immediate risk is limited, but the threat should not be ignored in environments where internal network security is critical. European entities with extensive use of ObjectPlanet Opinio in critical functions may face higher risk exposure.
Mitigation Recommendations
1. Monitor and restrict outbound HTTP requests from servers running ObjectPlanet Opinio, especially those handling survey imports, to only trusted destinations. 2. Implement network egress filtering and firewall rules to prevent unauthorized internal or external requests initiated by the application server. 3. Enforce strict access controls and minimize privileges for users who can perform survey imports to reduce the risk of exploitation. 4. Conduct regular audits and logging of import feature usage to detect anomalous or suspicious request patterns indicative of SSRF attempts. 5. Engage with ObjectPlanet for timely patches or updates addressing this vulnerability and apply them promptly once available. 6. Consider deploying web application firewalls (WAFs) with SSRF detection capabilities to block malicious crafted requests. 7. Segment internal networks to limit the impact of SSRF-induced requests reaching sensitive internal services. 8. Educate administrators and developers about SSRF risks and secure coding practices to prevent similar issues in future versions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2025-13872: CWE-918 Server-Side Request Forgery (SSRF) in ObjectPlanet Opinio
Description
CVE-2025-13872 is a Blind Server-Side Request Forgery (SSRF) vulnerability found in ObjectPlanet Opinio version 7. 26 rev12562. It affects the survey-import feature on web-based platforms, allowing an attacker with high privileges to force the server to perform arbitrary HTTP GET requests to destinations of their choosing. The vulnerability has a low CVSS 4. 0 score of 2. 1 due to high attack complexity and required privileges. No known exploits are currently reported in the wild. While the direct impact is limited, SSRF can be leveraged for internal network reconnaissance or to access restricted resources if combined with other vulnerabilities. European organizations using ObjectPlanet Opinio should assess exposure and restrict server outbound requests where possible. Mitigations include applying vendor patches when available, restricting network egress, and monitoring unusual server request patterns.
AI-Powered Analysis
Technical Analysis
CVE-2025-13872 is a Blind Server-Side Request Forgery (SSRF) vulnerability identified in ObjectPlanet Opinio version 7.26 rev12562, a web-based survey and polling platform. The flaw exists in the survey-import feature, which improperly validates or sanitizes input URLs used during the import process. An attacker with high privileges on the system can craft malicious import requests that cause the server to issue HTTP GET requests to arbitrary destinations. This SSRF is 'blind' because the attacker does not receive direct response data from the targeted requests, limiting immediate exploitation but still enabling indirect reconnaissance or interaction with internal services. The vulnerability has been assigned a CVSS 4.0 score of 2.1, reflecting its low severity due to the high attack complexity, requirement for privileged access, and lack of user interaction. No public exploits or active exploitation have been reported to date. Despite the low score, SSRF vulnerabilities can be leveraged in chained attacks to pivot into internal networks, access metadata services, or bypass firewalls if the server has broad network access. The lack of available patches at the time of disclosure means organizations must rely on network-level mitigations and monitoring until vendor fixes are released. This vulnerability is cataloged under CWE-918, which covers SSRF issues where servers are tricked into making unintended requests. The affected product, ObjectPlanet Opinio, is used primarily in survey and opinion polling contexts, often by market research firms and public institutions.
Potential Impact
For European organizations, the impact of CVE-2025-13872 is generally low but context-dependent. Since exploitation requires high privileges on the server, the vulnerability does not directly enable remote attackers to gain initial access. However, once an attacker has such access, they can use SSRF to perform internal network reconnaissance, potentially accessing sensitive internal services or data not exposed externally. This can lead to information disclosure or facilitate lateral movement within the network. Organizations handling sensitive survey data or operating in regulated sectors (e.g., government polling agencies, market research firms) could face reputational damage or compliance issues if internal data is exposed. The vulnerability could also be used to bypass network segmentation or firewall rules if the server can reach otherwise restricted endpoints. Given the low CVSS score and lack of known exploits, immediate risk is limited, but the threat should not be ignored in environments where internal network security is critical. European entities with extensive use of ObjectPlanet Opinio in critical functions may face higher risk exposure.
Mitigation Recommendations
1. Monitor and restrict outbound HTTP requests from servers running ObjectPlanet Opinio, especially those handling survey imports, to only trusted destinations. 2. Implement network egress filtering and firewall rules to prevent unauthorized internal or external requests initiated by the application server. 3. Enforce strict access controls and minimize privileges for users who can perform survey imports to reduce the risk of exploitation. 4. Conduct regular audits and logging of import feature usage to detect anomalous or suspicious request patterns indicative of SSRF attempts. 5. Engage with ObjectPlanet for timely patches or updates addressing this vulnerability and apply them promptly once available. 6. Consider deploying web application firewalls (WAFs) with SSRF detection capabilities to block malicious crafted requests. 7. Segment internal networks to limit the impact of SSRF-induced requests reaching sensitive internal services. 8. Educate administrators and developers about SSRF risks and secure coding practices to prevent similar issues in future versions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- TCS-CERT
- Date Reserved
- 2025-12-02T09:17:04.605Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692ebbcb5ae7112264a6911e
Added to database: 12/2/2025, 10:13:31 AM
Last enriched: 12/2/2025, 10:28:35 AM
Last updated: 12/2/2025, 11:15:29 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13353: CWE-330 Use of Insufficiently Random Values in Cloudflare gokey
HighCVE-2025-13873: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ObjectPlanet Opinio
MediumCVE-2025-13871: CWE-352 Cross-Site Request Forgery (CSRF) in ObjectPlanet Opinio
LowCVE-2025-10971: CWE-922 Insecure Storage of Sensitive Information in FERMAX ELECTRÓNICA S.A.U MeetMe
HighCVE-2025-13696: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in softdiscover Zigaform – Price Calculator & Cost Estimation Form Builder Lite
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.