Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15264: Server-Side Request Forgery in FeehiCMS

0
Medium
VulnerabilityCVE-2025-15264cvecve-2025-15264
Published: Tue Dec 30 2025 (12/30/2025, 19:02:05 UTC)
Source: CVE Database V5
Product: FeehiCMS

Description

A vulnerability was determined in FeehiCMS up to 2.1.1. Impacted is an unknown function of the file frontend/web/timthumb.php of the component TimThumb. Executing manipulation of the argument src can lead to server-side request forgery. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/30/2025, 22:29:00 UTC

Technical Analysis

CVE-2025-15264 is a server-side request forgery (SSRF) vulnerability identified in FeehiCMS up to version 2.1.1, specifically within the TimThumb component's frontend/web/timthumb.php file. The vulnerability stems from insufficient validation or sanitization of the 'src' parameter, which is used to specify image sources or URLs for processing. An attacker can manipulate this parameter to coerce the server into making arbitrary HTTP requests to internal or external systems. This can lead to unauthorized access to internal services, bypassing network restrictions, or potentially exposing sensitive data. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The vendor has not responded to disclosure attempts, and no official patches or mitigations have been published yet. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and low impact on confidentiality, integrity, and availability individually but combined to a medium severity score of 6.9. While no known exploits have been reported in the wild, the public disclosure of the vulnerability increases the likelihood of exploitation attempts. FeehiCMS is a content management system used primarily in certain web hosting environments, and the TimThumb component is commonly used for image resizing and caching, making this vulnerability relevant for websites relying on FeehiCMS for content delivery.

Potential Impact

For European organizations, exploitation of CVE-2025-15264 could allow attackers to perform SSRF attacks that bypass perimeter defenses, potentially accessing internal services that are not directly exposed to the internet. This can lead to unauthorized data access, internal network reconnaissance, or pivoting to other systems. Confidentiality may be compromised if internal APIs or metadata services are accessed. Integrity and availability impacts are less direct but possible if the attacker leverages SSRF to trigger further attacks or denial-of-service conditions. Organizations running FeehiCMS on public-facing web servers are particularly at risk, especially those in sectors like government, finance, healthcare, or critical infrastructure where internal network confidentiality is paramount. The lack of vendor response and patches increases the window of exposure, requiring proactive mitigation. Additionally, the medium severity rating suggests that while the vulnerability is serious, it does not allow direct code execution or full system compromise without additional conditions.

Mitigation Recommendations

European organizations should immediately audit their web infrastructure to identify any deployments of FeehiCMS versions 2.1.0 or 2.1.1. If found, they should consider the following specific actions: 1) Disable or restrict access to the TimThumb component, especially the frontend/web/timthumb.php endpoint, until a patch or official fix is available. 2) Implement strict input validation and sanitization on the 'src' parameter at the web application firewall (WAF) or reverse proxy level to block suspicious or unexpected URLs, particularly those targeting internal IP ranges or localhost addresses. 3) Employ network segmentation and egress filtering to limit the web server's ability to make arbitrary outbound HTTP requests, reducing SSRF impact. 4) Monitor web server logs for unusual outbound requests or access patterns to the vulnerable endpoint. 5) Consider deploying runtime application self-protection (RASP) tools that can detect and block SSRF attempts. 6) Engage with the FeehiCMS community or security forums for updates or unofficial patches. 7) Plan for an upgrade or migration to a secure CMS platform if no timely vendor patch is forthcoming. These measures go beyond generic advice by focusing on immediate containment and layered defense specific to SSRF in FeehiCMS.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-29T15:24:49.090Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450a2db813ff03e2be06d

Added to database: 12/30/2025, 10:22:26 PM

Last enriched: 12/30/2025, 10:29:00 PM

Last updated: 1/7/2026, 4:12:36 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats