Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49335: CWE-918 Server-Side Request Forgery (SSRF) in minnur External Media

0
Medium
VulnerabilityCVE-2025-49335cvecve-2025-49335cwe-918
Published: Wed Jan 07 2026 (01/07/2026, 14:12:43 UTC)
Source: CVE Database V5
Vendor/Project: minnur
Product: External Media

Description

CVE-2025-49335 is a Server-Side Request Forgery (SSRF) vulnerability found in the minnur External Media product, affecting versions up to 1. 0. 36. This vulnerability allows an attacker with low privileges to induce the server to make unauthorized requests to internal or external resources. The vulnerability has a CVSS 3. 1 base score of 4. 9, indicating medium severity, with a network attack vector, high attack complexity, and no user interaction required. Exploitation could lead to limited confidentiality and integrity impacts but does not affect availability. No known exploits are currently reported in the wild. European organizations using this product should be aware of the risk of internal network reconnaissance or data exposure through SSRF.

AI-Powered Analysis

AILast updated: 01/14/2026, 16:04:57 UTC

Technical Analysis

CVE-2025-49335 identifies a Server-Side Request Forgery (SSRF) vulnerability in the minnur External Media product, affecting all versions up to 1.0.36. SSRF vulnerabilities occur when an attacker can manipulate a server to send crafted requests to unintended destinations, potentially accessing internal systems or sensitive data not directly exposed to the attacker. In this case, the vulnerability allows an attacker with low privileges (PR:L) to trigger server-side requests without requiring user interaction (UI:N). The attack vector is network-based (AV:N), but the attack complexity is high (AC:H), indicating that exploitation requires specific conditions or knowledge. The vulnerability impacts confidentiality and integrity to a limited extent (C:L/I:L) but does not affect availability (A:N). The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component, potentially impacting other parts of the system. No patches or exploits are currently available, but the vulnerability is published and reserved since mid-2025. SSRF can be leveraged to perform internal reconnaissance, bypass firewalls, or access metadata services in cloud environments, which could lead to further attacks. The lack of known exploits suggests this is a newly disclosed issue, but the risk remains significant for environments where minnur External Media is deployed.

Potential Impact

For European organizations, the SSRF vulnerability in minnur External Media poses risks primarily related to unauthorized internal network access and potential data leakage. Attackers could exploit this flaw to scan internal services, access sensitive internal APIs, or retrieve confidential information from internal systems that are not directly accessible externally. This could lead to further lateral movement or privilege escalation within the network. The limited confidentiality and integrity impact means that while full system compromise is unlikely directly from this vulnerability, it can serve as a stepping stone for more severe attacks. Organizations in sectors with sensitive data or critical infrastructure using minnur External Media are at higher risk. The medium CVSS score reflects the need for attention but not immediate emergency response. The absence of known exploits reduces immediate threat but does not eliminate future risk. European entities with strict data protection regulations (e.g., GDPR) must consider the potential for data exposure and comply with notification requirements if exploitation occurs.

Mitigation Recommendations

1. Monitor minnur vendor communications closely and apply security patches promptly once released to address CVE-2025-49335. 2. Until patches are available, implement network-level restrictions to limit the server's ability to make arbitrary outbound requests, such as firewall rules restricting egress traffic to only necessary destinations. 3. Employ strict input validation and sanitization on any user-controllable parameters that influence server-side requests to prevent injection of malicious URLs or payloads. 4. Use network segmentation to isolate the server running External Media from sensitive internal resources and metadata services to reduce the impact of potential SSRF exploitation. 5. Enable logging and monitoring for unusual outbound request patterns from the affected server to detect potential exploitation attempts early. 6. Conduct internal security assessments and penetration testing focusing on SSRF vectors to identify and remediate similar weaknesses. 7. Educate development and operations teams about SSRF risks and secure coding practices to prevent future vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-06-04T09:42:27.085Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e6d507349d0379da4e26a

Added to database: 1/7/2026, 2:27:28 PM

Last enriched: 1/14/2026, 4:04:57 PM

Last updated: 2/7/2026, 11:36:55 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats