CVE-2025-14008: Server-Side Request Forgery in dayrui XunRuiCMS
A flaw has been found in dayrui XunRuiCMS up to 4.7.1. This vulnerability affects unknown code of the file admin79f2ec220c7e.php?c=api&m=test_site_domain of the component Project Domain Change Test. This manipulation of the argument v causes server-side request forgery. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-14008 is a server-side request forgery vulnerability affecting dayrui XunRuiCMS versions 4.7.0 and 4.7.1. The vulnerability exists in the admin79f2ec220c7e.php file within the Project Domain Change Test component, specifically in the handling of the 'v' parameter. An attacker with high privileges can manipulate this parameter to force the server to send crafted HTTP requests to arbitrary destinations, potentially accessing internal resources or services not otherwise exposed externally. This SSRF flaw can be exploited remotely without user interaction, but it requires the attacker to have authenticated high-level access to the CMS backend. The vulnerability has a CVSS 4.0 score of 5.1, reflecting medium severity due to limited scope and required privileges. The vendor was notified but has not issued a patch or response, and public exploits have been published, increasing the risk of exploitation. The lack of authentication bypass reduces the risk to some extent, but the ability to pivot inside the network or access sensitive internal endpoints remains a concern. No mitigation patches are currently available, so organizations must rely on compensating controls.
Potential Impact
For European organizations using dayrui XunRuiCMS versions 4.7.0 or 4.7.1, this SSRF vulnerability poses a risk of internal network reconnaissance and potential access to sensitive internal services that are not directly exposed to the internet. Attackers with high-level CMS credentials could exploit this flaw to bypass perimeter defenses, potentially leading to data leakage, unauthorized internal service access, or further lateral movement within the network. This could impact confidentiality and integrity of internal systems and data. Given the CMS’s role in managing web content, exploitation could also lead to website defacement or disruption if combined with other vulnerabilities. The medium severity rating suggests a moderate risk, but the published exploit and lack of vendor response increase urgency. Organizations in sectors with high-value internal services or sensitive data, such as finance, government, or critical infrastructure, could face significant operational and reputational damage if exploited.
Mitigation Recommendations
1. Immediately audit and restrict administrative access to the XunRuiCMS backend, ensuring only trusted personnel have high-level privileges. 2. Implement network segmentation and firewall rules to limit the CMS server's ability to initiate outbound HTTP requests to internal resources, effectively containing SSRF exploitation. 3. Monitor and log all outbound requests from the CMS server to detect unusual or unauthorized connections indicative of SSRF attempts. 4. If possible, disable or restrict the vulnerable Project Domain Change Test feature until a patch is available. 5. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable endpoint or parameter. 6. Engage in active threat hunting for signs of exploitation, especially if high-privilege credentials may have been compromised. 7. Maintain regular backups and incident response readiness to mitigate potential damage from exploitation. 8. Follow vendor communications closely for any future patches or updates addressing this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-14008: Server-Side Request Forgery in dayrui XunRuiCMS
Description
A flaw has been found in dayrui XunRuiCMS up to 4.7.1. This vulnerability affects unknown code of the file admin79f2ec220c7e.php?c=api&m=test_site_domain of the component Project Domain Change Test. This manipulation of the argument v causes server-side request forgery. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-14008 is a server-side request forgery vulnerability affecting dayrui XunRuiCMS versions 4.7.0 and 4.7.1. The vulnerability exists in the admin79f2ec220c7e.php file within the Project Domain Change Test component, specifically in the handling of the 'v' parameter. An attacker with high privileges can manipulate this parameter to force the server to send crafted HTTP requests to arbitrary destinations, potentially accessing internal resources or services not otherwise exposed externally. This SSRF flaw can be exploited remotely without user interaction, but it requires the attacker to have authenticated high-level access to the CMS backend. The vulnerability has a CVSS 4.0 score of 5.1, reflecting medium severity due to limited scope and required privileges. The vendor was notified but has not issued a patch or response, and public exploits have been published, increasing the risk of exploitation. The lack of authentication bypass reduces the risk to some extent, but the ability to pivot inside the network or access sensitive internal endpoints remains a concern. No mitigation patches are currently available, so organizations must rely on compensating controls.
Potential Impact
For European organizations using dayrui XunRuiCMS versions 4.7.0 or 4.7.1, this SSRF vulnerability poses a risk of internal network reconnaissance and potential access to sensitive internal services that are not directly exposed to the internet. Attackers with high-level CMS credentials could exploit this flaw to bypass perimeter defenses, potentially leading to data leakage, unauthorized internal service access, or further lateral movement within the network. This could impact confidentiality and integrity of internal systems and data. Given the CMS’s role in managing web content, exploitation could also lead to website defacement or disruption if combined with other vulnerabilities. The medium severity rating suggests a moderate risk, but the published exploit and lack of vendor response increase urgency. Organizations in sectors with high-value internal services or sensitive data, such as finance, government, or critical infrastructure, could face significant operational and reputational damage if exploited.
Mitigation Recommendations
1. Immediately audit and restrict administrative access to the XunRuiCMS backend, ensuring only trusted personnel have high-level privileges. 2. Implement network segmentation and firewall rules to limit the CMS server's ability to initiate outbound HTTP requests to internal resources, effectively containing SSRF exploitation. 3. Monitor and log all outbound requests from the CMS server to detect unusual or unauthorized connections indicative of SSRF attempts. 4. If possible, disable or restrict the vulnerable Project Domain Change Test feature until a patch is available. 5. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable endpoint or parameter. 6. Engage in active threat hunting for signs of exploitation, especially if high-privilege credentials may have been compromised. 7. Maintain regular backups and incident response readiness to mitigate potential damage from exploitation. 8. Follow vendor communications closely for any future patches or updates addressing this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-04T08:11:07.404Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6931a58504d931fa5b3e25c2
Added to database: 12/4/2025, 3:15:17 PM
Last enriched: 12/4/2025, 3:33:17 PM
Last updated: 12/4/2025, 5:52:54 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14012: SQL Injection in JIZHICMS
MediumCVE-2025-14011: SQL Injection in JIZHICMS
MediumCVE-2025-66373: n/a
UnknownCVE-2025-66287: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Red Hat Red Hat Enterprise Linux 6
HighCVE-2025-63364: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.