Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14008: Server-Side Request Forgery in dayrui XunRuiCMS

0
Medium
VulnerabilityCVE-2025-14008cvecve-2025-14008
Published: Thu Dec 04 2025 (12/04/2025, 15:02:06 UTC)
Source: CVE Database V5
Vendor/Project: dayrui
Product: XunRuiCMS

Description

A flaw has been found in dayrui XunRuiCMS up to 4.7.1. This vulnerability affects unknown code of the file admin79f2ec220c7e.php?c=api&m=test_site_domain of the component Project Domain Change Test. This manipulation of the argument v causes server-side request forgery. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:47:59 UTC

Technical Analysis

CVE-2025-14008 is a server-side request forgery vulnerability found in dayrui XunRuiCMS versions 4.7.0 and 4.7.1. The flaw exists in the file admin79f2ec220c7e.php within the Project Domain Change Test component, where the 'v' parameter is insufficiently validated. This allows an attacker to manipulate the argument to coerce the server into making arbitrary HTTP requests to internal or external systems. SSRF vulnerabilities can be leveraged to bypass firewall restrictions, access internal services, or gather sensitive information from the server's network environment. The vulnerability can be triggered remotely without user interaction but requires some level of privileges (PR:H), indicating that an attacker must have some authenticated access or elevated rights to exploit it. The vendor was notified early but did not respond or provide a patch, and no official fixes are currently available. Although no known exploits are reported in the wild, proof-of-concept code has been published, increasing the risk of exploitation. The CVSS 4.0 vector indicates network attack vector, low complexity, no user interaction, and partial impact on confidentiality, integrity, and availability, resulting in a medium severity rating. The lack of vendor response and patch availability necessitates immediate attention from organizations using these versions of XunRuiCMS.

Potential Impact

The SSRF vulnerability in XunRuiCMS can allow attackers to make the vulnerable server send crafted requests to internal or external systems, potentially exposing sensitive internal resources or metadata services. This can lead to unauthorized information disclosure, such as internal IP addresses, services, or configuration details. Attackers might leverage this to pivot further into internal networks, bypass firewall protections, or conduct reconnaissance for more severe attacks. While the vulnerability requires some privileges, in environments where multiple users have elevated access, the risk increases. The impact on confidentiality is moderate due to possible data exposure; integrity and availability impacts are limited but possible if the SSRF is chained with other exploits. The absence of patches and vendor support increases the window of exposure, especially for organizations relying on affected versions. This threat is particularly concerning for organizations with sensitive internal networks or those using XunRuiCMS in critical infrastructure or business applications.

Mitigation Recommendations

Since no official patches are available, organizations should implement immediate compensating controls. First, restrict access to the vulnerable admin PHP file and the Project Domain Change Test feature to trusted administrators only, ideally via IP whitelisting or VPN. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious SSRF payloads targeting the 'v' parameter. Monitor and log all requests to the vulnerable endpoint for unusual activity. If possible, disable or remove the Project Domain Change Test functionality until a patch is released. Conduct internal network segmentation to limit the server's ability to reach sensitive internal services. Review and minimize privileges for users who can access the vulnerable component to reduce exploitation risk. Stay alert for vendor updates or community patches and apply them promptly once available. Finally, consider deploying network-level egress filtering to prevent unauthorized outbound requests from the server.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-04T08:11:07.404Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6931a58504d931fa5b3e25c2

Added to database: 12/4/2025, 3:15:17 PM

Last enriched: 2/24/2026, 10:47:59 PM

Last updated: 3/24/2026, 1:00:21 PM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses