Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46651: n/a

0
Medium
VulnerabilityCVE-2025-46651cvecve-2025-46651
Published: Tue Feb 03 2026 (02/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Tiny File Manager through 2.6 contains a server-side request forgery (SSRF) vulnerability in the URL upload feature. Due to insufficient validation of user-supplied URLs, an attacker can send crafted requests to localhost by using http://www.127.0.0.1.example.com/ or a similarly constructed domain name. This may lead to unauthorized port scanning or access to internal-only services.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 11:36:34 UTC

Technical Analysis

CVE-2025-46651 is a server-side request forgery (SSRF) vulnerability identified in Tiny File Manager, a lightweight web-based file management tool, affecting versions through 2.6. The vulnerability stems from insufficient validation of URLs supplied by users in the URL upload feature. Specifically, the application fails to correctly parse and validate domain names such as 'http://www.127.0.0.1.example.com/', which resolve to localhost (127.0.0.1) due to DNS resolution rules. This allows an attacker to craft malicious URLs that bypass domain validation and cause the server to send HTTP requests to internal network addresses, including localhost and other internal-only services. The SSRF can be leveraged to perform unauthorized port scanning on the internal network, identify running services, and potentially access sensitive internal endpoints that are not exposed externally. The vulnerability requires the attacker to have low privileges (PR:L) but does not require user interaction (UI:N). The CVSS score of 4.3 reflects a medium severity, indicating limited confidentiality impact and no direct integrity or availability impact. No public exploits have been reported yet, but the flaw poses a risk especially in environments where Tiny File Manager is accessible from untrusted networks. The vulnerability is categorized under CWE-918 (SSRF). No patches or fixes are currently linked, emphasizing the need for immediate mitigation steps by administrators.

Potential Impact

For European organizations, this SSRF vulnerability could lead to unauthorized reconnaissance of internal network services, potentially exposing sensitive infrastructure details. Attackers could map internal ports and services, which may facilitate subsequent targeted attacks or lateral movement within the network. Organizations that expose Tiny File Manager to the internet or untrusted networks are particularly vulnerable. The confidentiality of internal network topology and service configurations is at risk, which could impact sectors such as finance, healthcare, government, and critical infrastructure. While the vulnerability does not directly compromise data integrity or availability, the information gained through SSRF could be used to orchestrate more damaging attacks. Given the medium severity and the requirement for low privileges, the threat level is moderate but should not be underestimated, especially in environments with weak network segmentation or insufficient internal access controls.

Mitigation Recommendations

To mitigate CVE-2025-46651, organizations should implement strict validation and sanitization of user-supplied URLs in the Tiny File Manager application, ensuring that URLs resolving to localhost, loopback addresses, or internal IP ranges are rejected. Network-level controls such as firewall rules should restrict outbound HTTP requests from the application server to internal-only IP ranges. Employing network segmentation to isolate management interfaces and internal services can limit the impact of SSRF exploitation. Monitoring and logging outbound requests from the application can help detect suspicious activity indicative of SSRF attempts. Administrators should consider restricting access to Tiny File Manager to trusted networks or VPN users only. If possible, update or patch Tiny File Manager once an official fix is released. In the interim, disabling the URL upload feature or replacing it with safer alternatives can reduce exposure. Regular security assessments and penetration testing focusing on SSRF vectors are recommended to identify and remediate similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-04-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6982fcd1f9fa50a62f76625d

Added to database: 2/4/2026, 8:01:21 AM

Last enriched: 2/11/2026, 11:36:34 AM

Last updated: 3/25/2026, 3:42:08 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses