Skip to main content

CVE-2025-51058: n/a

Medium
VulnerabilityCVE-2025-51058cvecve-2025-51058
Published: Wed Aug 06 2025 (08/06/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Bottinelli Informatical Vedo Suite 2024.17 is vulnerable to Server-side Request Forgery (SSRF) in the /api_vedo/video/preview endpoint, which allows remote authenticated attackers to trigger HTTP requests towards arbitrary remote paths via the "file" URL parameter.

AI-Powered Analysis

AILast updated: 08/14/2025, 01:03:11 UTC

Technical Analysis

CVE-2025-51058 is a Server-Side Request Forgery (SSRF) vulnerability identified in Bottinelli Informatical Vedo Suite version 2024.17. The vulnerability exists in the /api_vedo/video/preview endpoint, where the "file" URL parameter can be manipulated by a remote authenticated attacker to cause the server to initiate HTTP requests to arbitrary remote locations. SSRF vulnerabilities allow attackers to abuse the server as a proxy to interact with internal or external systems that may otherwise be inaccessible. In this case, the attacker must be authenticated, which limits the attack surface to users with valid credentials. The vulnerability does not require user interaction beyond authentication and has a CVSS v3.1 base score of 6.5, indicating a medium severity. The CVSS vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) shows the attack can be performed remotely over the network with low attack complexity and requires privileges (authenticated user). The impact is primarily on confidentiality, as the attacker can potentially access sensitive internal resources or data by triggering requests to arbitrary URLs. There is no direct impact on integrity or availability reported. No patches or known exploits in the wild have been reported yet. The vulnerability is classified under CWE-918 (Server-Side Request Forgery).

Potential Impact

For European organizations using Bottinelli Informatical Vedo Suite 2024.17, this SSRF vulnerability poses a significant risk to internal network confidentiality. Attackers with valid credentials could exploit this flaw to access internal services, potentially bypassing firewalls or network segmentation, leading to unauthorized data disclosure. This could include sensitive internal APIs, metadata services, or other protected resources. Although the vulnerability does not directly affect integrity or availability, the exposure of confidential information could facilitate further attacks such as lateral movement or privilege escalation. Given the requirement for authentication, the risk is somewhat mitigated by access controls; however, insider threats or compromised credentials could still lead to exploitation. European organizations with strict data protection regulations (e.g., GDPR) could face compliance issues and reputational damage if sensitive data is exposed. Additionally, sectors with high-value internal resources such as finance, healthcare, and government are particularly at risk.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the /api_vedo/video/preview endpoint to only trusted users and monitoring for unusual request patterns involving the "file" parameter. 2. Implement strict input validation and sanitization on the "file" URL parameter to ensure only allowed URLs or file paths are processed, ideally using a whitelist approach. 3. Employ network-level controls such as egress filtering to prevent the server from making unauthorized outbound HTTP requests to internal or sensitive network segments. 4. Enforce multi-factor authentication (MFA) to reduce the risk of credential compromise that could lead to exploitation. 5. Conduct thorough logging and monitoring of API usage to detect potential SSRF exploitation attempts. 6. Coordinate with Bottinelli Informatical to obtain and apply patches or updates as soon as they become available. 7. Perform internal security assessments and penetration tests focusing on SSRF vectors to identify and remediate similar weaknesses. 8. Educate users with access about the risks of credential sharing and phishing attacks to reduce insider threat risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6893bf74ad5a09ad00f40904

Added to database: 8/6/2025, 8:47:48 PM

Last enriched: 8/14/2025, 1:03:11 AM

Last updated: 8/27/2025, 5:54:51 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats