Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-28963: Server-Side Request Forgery (SSRF) in Md Yeasin Ul Haider URL Shortener

0
Unknown
VulnerabilityCVE-2025-28963cvecve-2025-28963
Published: Fri Jul 04 2025 (07/04/2025, 08:42:13 UTC)
Source: CVE Database V5
Vendor/Project: Md Yeasin Ul Haider
Product: URL Shortener

Description

Server-Side Request Forgery (SSRF) vulnerability in Md Yeasin Ul Haider URL Shortener exact-links allows Server Side Request Forgery.This issue affects URL Shortener: from n/a through <= 3.0.7.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 12:03:55 UTC

Technical Analysis

CVE-2025-28963 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Md Yeasin Ul Haider URL Shortener product, specifically affecting versions up to and including 3.0.7. SSRF vulnerabilities occur when an attacker can manipulate a server to make HTTP requests to arbitrary domains or internal network resources on behalf of the server. In this case, the URL Shortener's 'exact-links' feature does not properly validate or restrict URLs, enabling attackers to craft malicious requests that the server executes internally. The vulnerability has a CVSS 3.1 vector of AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N, indicating network attack vector, high attack complexity, no privileges or user interaction required, with a scope change and low confidentiality and integrity impact but no availability impact. The scope change (S:C) suggests that the vulnerability affects resources beyond the initially vulnerable component, potentially allowing attackers to access internal services or metadata endpoints. Although no known exploits are reported in the wild, the vulnerability poses a risk of information disclosure and limited data manipulation. The absence of patches at the time of publication means organizations must rely on mitigations until updates are released. SSRF vulnerabilities are often leveraged to bypass firewalls, access internal-only services, or perform port scanning within private networks, making this a significant concern for environments where the URL shortener is exposed to untrusted users or the internet.

Potential Impact

The primary impact of CVE-2025-28963 is unauthorized internal network access via SSRF, which can lead to sensitive information disclosure such as internal IP addresses, metadata services, or internal APIs. This can facilitate further attacks like privilege escalation or lateral movement within an organization's network. The integrity impact is low but present, as attackers might influence server-side requests to manipulate data or trigger unintended actions. Availability is not affected. Organizations relying on this URL shortener in public-facing environments are at risk of attackers exploiting this vulnerability to bypass perimeter defenses. The high attack complexity reduces the likelihood of widespread exploitation but does not eliminate risk, especially in targeted attacks. The vulnerability's scope change means that the attacker can affect resources beyond the URL shortener itself, increasing potential damage. Overall, this vulnerability could compromise confidentiality and integrity of internal systems, posing a moderate risk to organizations worldwide.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict network-level controls to limit the URL shortener server's ability to make outbound requests to internal or sensitive resources. This includes firewall rules restricting outbound traffic from the URL shortener server to only necessary external destinations. Input validation and URL whitelisting should be enforced to prevent arbitrary URLs from being processed by the URL shortener. Monitoring and logging of outbound requests from the URL shortener server can help detect suspicious activity indicative of SSRF exploitation attempts. If possible, isolate the URL shortener service in a segmented network zone with minimal access to internal resources. Additionally, organizations should stay alert for updates or patches from the vendor and apply them promptly. Conducting internal penetration testing focusing on SSRF scenarios can help identify residual risks. Finally, educating developers and administrators about SSRF risks and secure coding practices can reduce future vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-03-11T08:10:19.510Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686796cb6f40f0eb729fa560

Added to database: 7/4/2025, 8:54:35 AM

Last enriched: 4/2/2026, 12:03:55 PM

Last updated: 4/13/2026, 7:20:47 PM

Views: 100

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses