Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14008: Server-Side Request Forgery in dayrui XunRuiCMS

0
Medium
VulnerabilityCVE-2025-14008cvecve-2025-14008
Published: Thu Dec 04 2025 (12/04/2025, 15:02:06 UTC)
Source: CVE Database V5
Vendor/Project: dayrui
Product: XunRuiCMS

Description

A flaw has been found in dayrui XunRuiCMS up to 4.7.1. This vulnerability affects unknown code of the file admin79f2ec220c7e.php?c=api&m=test_site_domain of the component Project Domain Change Test. This manipulation of the argument v causes server-side request forgery. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/04/2025, 15:33:17 UTC

Technical Analysis

CVE-2025-14008 is a server-side request forgery vulnerability affecting dayrui XunRuiCMS versions 4.7.0 and 4.7.1. The vulnerability exists in the admin79f2ec220c7e.php file within the Project Domain Change Test component, specifically in the handling of the 'v' parameter. An attacker with high privileges can manipulate this parameter to force the server to send crafted HTTP requests to arbitrary destinations, potentially accessing internal resources or services not otherwise exposed externally. This SSRF flaw can be exploited remotely without user interaction, but it requires the attacker to have authenticated high-level access to the CMS backend. The vulnerability has a CVSS 4.0 score of 5.1, reflecting medium severity due to limited scope and required privileges. The vendor was notified but has not issued a patch or response, and public exploits have been published, increasing the risk of exploitation. The lack of authentication bypass reduces the risk to some extent, but the ability to pivot inside the network or access sensitive internal endpoints remains a concern. No mitigation patches are currently available, so organizations must rely on compensating controls.

Potential Impact

For European organizations using dayrui XunRuiCMS versions 4.7.0 or 4.7.1, this SSRF vulnerability poses a risk of internal network reconnaissance and potential access to sensitive internal services that are not directly exposed to the internet. Attackers with high-level CMS credentials could exploit this flaw to bypass perimeter defenses, potentially leading to data leakage, unauthorized internal service access, or further lateral movement within the network. This could impact confidentiality and integrity of internal systems and data. Given the CMS’s role in managing web content, exploitation could also lead to website defacement or disruption if combined with other vulnerabilities. The medium severity rating suggests a moderate risk, but the published exploit and lack of vendor response increase urgency. Organizations in sectors with high-value internal services or sensitive data, such as finance, government, or critical infrastructure, could face significant operational and reputational damage if exploited.

Mitigation Recommendations

1. Immediately audit and restrict administrative access to the XunRuiCMS backend, ensuring only trusted personnel have high-level privileges. 2. Implement network segmentation and firewall rules to limit the CMS server's ability to initiate outbound HTTP requests to internal resources, effectively containing SSRF exploitation. 3. Monitor and log all outbound requests from the CMS server to detect unusual or unauthorized connections indicative of SSRF attempts. 4. If possible, disable or restrict the vulnerable Project Domain Change Test feature until a patch is available. 5. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable endpoint or parameter. 6. Engage in active threat hunting for signs of exploitation, especially if high-privilege credentials may have been compromised. 7. Maintain regular backups and incident response readiness to mitigate potential damage from exploitation. 8. Follow vendor communications closely for any future patches or updates addressing this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-04T08:11:07.404Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6931a58504d931fa5b3e25c2

Added to database: 12/4/2025, 3:15:17 PM

Last enriched: 12/4/2025, 3:33:17 PM

Last updated: 12/4/2025, 5:52:54 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats