CVE-2025-14116: Server-Side Request Forgery in xerrors Yuxi-Know
A vulnerability was detected in xerrors Yuxi-Know up to 0.4.0. This vulnerability affects the function OtherEmbedding.aencode of the file /src/models/embed.py. Performing manipulation of the argument health_url results in server-side request forgery. The attack can be initiated remotely. The exploit is now public and may be used. The patch is named 0ff771dc1933d5a6b78f804115e78a7d8625c3f3. To fix this issue, it is recommended to deploy a patch. The vendor responded with a vulnerability confirmation and a list of security measures they have established already (e.g. disabled URL parsing, disabled URL upload mode, removed URL-to-markdown conversion).
AI Analysis
Technical Summary
CVE-2025-14116 is a Server-Side Request Forgery vulnerability identified in the open-source or commercial product xerrors Yuxi-Know, affecting versions 0.1 through 0.4.0. The vulnerability resides in the OtherEmbedding.aencode function located in the /src/models/embed.py file. Specifically, the health_url argument can be manipulated by an attacker to induce the server to make arbitrary HTTP requests on behalf of the attacker. SSRF vulnerabilities allow attackers to bypass firewall restrictions, access internal services, or exfiltrate sensitive information by tricking the server into sending crafted requests. This vulnerability is exploitable remotely without user interaction, but requires the attacker to have high privileges on the system, which limits the attack surface somewhat. The CVSS 4.0 score of 5.1 reflects a medium severity, considering the ease of exploitation (low complexity), lack of user interaction, but requirement for privileges and limited impact on confidentiality, integrity, and availability. The vendor has acknowledged the vulnerability and implemented mitigations such as disabling URL parsing, disabling URL upload modes, and removing URL-to-markdown conversion to reduce attack vectors. A patch identified by commit 0ff771dc1933d5a6b78f804115e78a7d8625c3f3 is available and should be applied promptly. No known exploits are currently active in the wild, but the public disclosure of exploit code increases the urgency for remediation. The vulnerability could be leveraged to perform internal network reconnaissance, access metadata services, or pivot to other internal resources, posing a risk especially in cloud or segmented network environments.
Potential Impact
For European organizations, the impact of CVE-2025-14116 depends largely on their use of the xerrors Yuxi-Know product. Organizations that deploy this software in critical infrastructure, research, or data-sensitive environments could face risks of internal network exposure or data leakage through SSRF exploitation. Attackers could leverage this vulnerability to bypass perimeter defenses and access internal services that are otherwise inaccessible externally. This could lead to unauthorized access to sensitive information, disruption of internal services, or serve as a foothold for further lateral movement within the network. The requirement for high privileges to exploit reduces the risk from external attackers but elevates concern for insider threats or compromised accounts. The medium severity rating suggests that while the vulnerability is not immediately catastrophic, it could be a stepping stone in a multi-stage attack. European entities with stringent data protection regulations such as GDPR must consider the potential compliance implications if internal data is exposed or systems are compromised. The public availability of exploit code increases the likelihood of opportunistic attacks, making timely patching critical.
Mitigation Recommendations
European organizations should take the following specific mitigation steps beyond generic patching advice: 1) Immediately apply the vendor-provided patch (commit 0ff771dc1933d5a6b78f804115e78a7d8625c3f3) to all affected Yuxi-Know instances. 2) Audit and restrict access controls to ensure that only trusted, high-privilege users can invoke the vulnerable function or related services. 3) Implement network segmentation and firewall rules to limit outbound HTTP requests from the Yuxi-Know server to only trusted destinations, reducing SSRF impact. 4) Monitor logs for unusual outbound requests originating from the application, which may indicate exploitation attempts. 5) Disable any unnecessary URL parsing or upload features as recommended by the vendor to reduce attack surface. 6) Conduct internal penetration testing to verify that the vulnerability is fully remediated and that no SSRF vectors remain. 7) Educate developers and administrators about SSRF risks and secure coding practices to prevent similar issues in future releases. 8) Consider deploying web application firewalls (WAFs) with SSRF detection capabilities to provide an additional layer of defense.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium
CVE-2025-14116: Server-Side Request Forgery in xerrors Yuxi-Know
Description
A vulnerability was detected in xerrors Yuxi-Know up to 0.4.0. This vulnerability affects the function OtherEmbedding.aencode of the file /src/models/embed.py. Performing manipulation of the argument health_url results in server-side request forgery. The attack can be initiated remotely. The exploit is now public and may be used. The patch is named 0ff771dc1933d5a6b78f804115e78a7d8625c3f3. To fix this issue, it is recommended to deploy a patch. The vendor responded with a vulnerability confirmation and a list of security measures they have established already (e.g. disabled URL parsing, disabled URL upload mode, removed URL-to-markdown conversion).
AI-Powered Analysis
Technical Analysis
CVE-2025-14116 is a Server-Side Request Forgery vulnerability identified in the open-source or commercial product xerrors Yuxi-Know, affecting versions 0.1 through 0.4.0. The vulnerability resides in the OtherEmbedding.aencode function located in the /src/models/embed.py file. Specifically, the health_url argument can be manipulated by an attacker to induce the server to make arbitrary HTTP requests on behalf of the attacker. SSRF vulnerabilities allow attackers to bypass firewall restrictions, access internal services, or exfiltrate sensitive information by tricking the server into sending crafted requests. This vulnerability is exploitable remotely without user interaction, but requires the attacker to have high privileges on the system, which limits the attack surface somewhat. The CVSS 4.0 score of 5.1 reflects a medium severity, considering the ease of exploitation (low complexity), lack of user interaction, but requirement for privileges and limited impact on confidentiality, integrity, and availability. The vendor has acknowledged the vulnerability and implemented mitigations such as disabling URL parsing, disabling URL upload modes, and removing URL-to-markdown conversion to reduce attack vectors. A patch identified by commit 0ff771dc1933d5a6b78f804115e78a7d8625c3f3 is available and should be applied promptly. No known exploits are currently active in the wild, but the public disclosure of exploit code increases the urgency for remediation. The vulnerability could be leveraged to perform internal network reconnaissance, access metadata services, or pivot to other internal resources, posing a risk especially in cloud or segmented network environments.
Potential Impact
For European organizations, the impact of CVE-2025-14116 depends largely on their use of the xerrors Yuxi-Know product. Organizations that deploy this software in critical infrastructure, research, or data-sensitive environments could face risks of internal network exposure or data leakage through SSRF exploitation. Attackers could leverage this vulnerability to bypass perimeter defenses and access internal services that are otherwise inaccessible externally. This could lead to unauthorized access to sensitive information, disruption of internal services, or serve as a foothold for further lateral movement within the network. The requirement for high privileges to exploit reduces the risk from external attackers but elevates concern for insider threats or compromised accounts. The medium severity rating suggests that while the vulnerability is not immediately catastrophic, it could be a stepping stone in a multi-stage attack. European entities with stringent data protection regulations such as GDPR must consider the potential compliance implications if internal data is exposed or systems are compromised. The public availability of exploit code increases the likelihood of opportunistic attacks, making timely patching critical.
Mitigation Recommendations
European organizations should take the following specific mitigation steps beyond generic patching advice: 1) Immediately apply the vendor-provided patch (commit 0ff771dc1933d5a6b78f804115e78a7d8625c3f3) to all affected Yuxi-Know instances. 2) Audit and restrict access controls to ensure that only trusted, high-privilege users can invoke the vulnerable function or related services. 3) Implement network segmentation and firewall rules to limit outbound HTTP requests from the Yuxi-Know server to only trusted destinations, reducing SSRF impact. 4) Monitor logs for unusual outbound requests originating from the application, which may indicate exploitation attempts. 5) Disable any unnecessary URL parsing or upload features as recommended by the vendor to reduce attack surface. 6) Conduct internal penetration testing to verify that the vulnerability is fully remediated and that no SSRF vectors remain. 7) Educate developers and administrators about SSRF risks and secure coding practices to prevent similar issues in future releases. 8) Consider deploying web application firewalls (WAFs) with SSRF detection capabilities to provide an additional layer of defense.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-05T15:15:26.362Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6933607ff88dbe026c285293
Added to database: 12/5/2025, 10:45:19 PM
Last enriched: 12/12/2025, 11:37:08 PM
Last updated: 1/20/2026, 1:00:35 PM
Views: 117
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1183: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Botble TransP
MediumCVE-2025-41081: 79 in Zuinq Studio IsMyGym
MediumCVE-2025-14369: CWE-190: Integer Overflow or Wraparound in mackron dr_flac
HighCVE-2025-40679: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Bdtask Isshue
MediumCVE-2025-40644: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Riftzilla QRGen
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.