Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14004: Server-Side Request Forgery in dayrui XunRuiCMS

0
Medium
VulnerabilityCVE-2025-14004cvecve-2025-14004
Published: Thu Dec 04 2025 (12/04/2025, 13:32:06 UTC)
Source: CVE Database V5
Vendor/Project: dayrui
Product: XunRuiCMS

Description

A security flaw has been discovered in dayrui XunRuiCMS up to 4.7.1. Affected is an unknown function of the file /admind45f74adbd95.php?c=email&m=add of the component Email Setting Handler. Performing a manipulation results in server-side request forgery. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:46:53 UTC

Technical Analysis

CVE-2025-14004 is a server-side request forgery vulnerability affecting dayrui XunRuiCMS up to version 4.7.1. The vulnerability resides in an unspecified function within the Email Setting Handler component, accessible through the endpoint /admind45f74adbd95.php?c=email&m=add. An attacker with authenticated high-level privileges can manipulate input parameters to cause the server to send crafted HTTP requests to arbitrary destinations. This SSRF flaw can be exploited remotely without user interaction, enabling attackers to potentially access internal resources, bypass firewalls, or interact with internal services that are otherwise inaccessible externally. The vendor was contacted but has not provided a patch or mitigation guidance, and a public exploit has been released, increasing the risk of active exploitation. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required (though the description states high privileges are needed, which may be a discrepancy), no user interaction, and low to limited impact on confidentiality, integrity, and availability. The vulnerability is categorized as medium severity due to the moderate impact and exploitation requirements.

Potential Impact

The SSRF vulnerability in XunRuiCMS can allow attackers to leverage the compromised server to initiate unauthorized requests to internal or external systems. This can lead to internal network reconnaissance, access to sensitive internal services, or exploitation of other vulnerabilities within the internal network. While the direct impact on confidentiality, integrity, and availability is limited, SSRF can serve as a pivot point for more severe attacks, including data exfiltration, lateral movement, or denial of service on internal resources. Organizations running affected versions of XunRuiCMS may face increased risk of targeted attacks, especially if the CMS is deployed in environments with sensitive internal services or critical infrastructure. The lack of vendor response and public exploit availability further elevates the risk profile.

Mitigation Recommendations

1. Immediately restrict access to the vulnerable endpoint (/admind45f74adbd95.php?c=email&m=add) by limiting it to trusted administrators and internal networks only. 2. Implement strict input validation and sanitization on parameters that influence server-side requests to prevent arbitrary URL injection. 3. Use network-level controls such as firewall rules or web application firewalls (WAF) to block outgoing requests from the CMS server to untrusted or internal IP ranges. 4. Monitor server logs for unusual outbound requests or access patterns related to the vulnerable endpoint. 5. If possible, disable or remove the Email Setting Handler functionality if not in use. 6. Engage with the vendor or community to obtain patches or updates; if none are forthcoming, consider upgrading to a newer, unaffected CMS or applying custom patches. 7. Conduct regular security assessments and penetration tests focusing on SSRF and related vulnerabilities in web applications. 8. Employ network segmentation to limit the impact of SSRF exploitation by isolating critical internal services from the CMS server.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-04T08:10:55.927Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693190595cc187f88d96ed33

Added to database: 12/4/2025, 1:44:57 PM

Last enriched: 2/24/2026, 10:46:53 PM

Last updated: 3/22/2026, 1:20:27 PM

Views: 163

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses