CVE-2025-5140: Server-Side Request Forgery in Seeyon Zhiyuan OA Web Application System
A vulnerability classified as critical has been found in Seeyon Zhiyuan OA Web Application System up to 8.1 SP2. This affects the function this.oursNetService.getData of the file com\ours\www\ehr\openPlatform1\open4ClientType\controller\ThirdMenuController.class. The manipulation of the argument url leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-5140 is a server-side request forgery (SSRF) vulnerability identified in the Seeyon Zhiyuan OA Web Application System, specifically affecting versions up to 8.1 SP2. The vulnerability resides in the method this.oursNetService.getData within the ThirdMenuController.class file (path: com\ours\www\ehr\openPlatform1\open4ClientType\controller). The flaw allows an attacker to manipulate the 'url' argument passed to this function, enabling them to coerce the server into making arbitrary HTTP requests to internal or external resources. This SSRF vulnerability can be exploited remotely without authentication or user interaction, as indicated by the CVSS vector. The vendor has not responded to disclosure attempts, and no official patch is currently available. Although no known exploits are reported in the wild, the public disclosure of the exploit code increases the risk of exploitation. The CVSS 4.0 base score is 5.3 (medium severity), reflecting moderate impact and ease of exploitation. The vulnerability impacts confidentiality, integrity, and availability to a limited extent, as the attacker can potentially access internal services, scan internal networks, or cause denial of service by triggering unintended requests. However, the vulnerability does not require privileges or user interaction, increasing its risk profile. The lack of vendor response and patch availability means organizations using Seeyon Zhiyuan OA 8.1 SP2 remain exposed until mitigations or updates are applied.
Potential Impact
For European organizations using Seeyon Zhiyuan OA Web Application System, this SSRF vulnerability poses a significant risk. The ability to force the server to make arbitrary requests can lead to unauthorized internal network reconnaissance, access to sensitive internal services (such as databases, metadata services, or intranet applications), and potential data exfiltration or lateral movement within the network. Confidentiality could be compromised if internal endpoints expose sensitive information. Integrity and availability could also be affected if attackers leverage SSRF to trigger destructive actions or denial of service conditions on internal resources. Given that Seeyon Zhiyuan OA is an office automation platform, it likely handles sensitive corporate data, workflows, and communications, increasing the potential impact. The absence of a vendor patch and the public availability of exploit details heighten the urgency for European organizations to implement mitigations. The medium CVSS score suggests moderate risk, but the real-world impact could be higher depending on the internal network architecture and the criticality of the OA system within the organization.
Mitigation Recommendations
1. Immediate mitigation should include implementing network-level controls to restrict the OA server's outbound HTTP requests, limiting them only to trusted destinations. 2. Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious SSRF payloads targeting the vulnerable 'url' parameter. 3. Conduct internal network segmentation to isolate critical internal services from the OA server's network segment, reducing the attack surface. 4. Monitor logs for unusual outbound requests from the OA server, especially to internal IP ranges or unexpected external endpoints. 5. If possible, disable or restrict the functionality invoking this.oursNetService.getData until a patch is available. 6. Engage with Seeyon or third-party security vendors for potential unofficial patches or workarounds. 7. Plan for an update or migration to a patched version once available. 8. Educate IT and security teams about SSRF risks and detection techniques specific to this product. These targeted mitigations go beyond generic advice by focusing on network controls, monitoring, and application-specific restrictions.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2025-5140: Server-Side Request Forgery in Seeyon Zhiyuan OA Web Application System
Description
A vulnerability classified as critical has been found in Seeyon Zhiyuan OA Web Application System up to 8.1 SP2. This affects the function this.oursNetService.getData of the file com\ours\www\ehr\openPlatform1\open4ClientType\controller\ThirdMenuController.class. The manipulation of the argument url leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-5140 is a server-side request forgery (SSRF) vulnerability identified in the Seeyon Zhiyuan OA Web Application System, specifically affecting versions up to 8.1 SP2. The vulnerability resides in the method this.oursNetService.getData within the ThirdMenuController.class file (path: com\ours\www\ehr\openPlatform1\open4ClientType\controller). The flaw allows an attacker to manipulate the 'url' argument passed to this function, enabling them to coerce the server into making arbitrary HTTP requests to internal or external resources. This SSRF vulnerability can be exploited remotely without authentication or user interaction, as indicated by the CVSS vector. The vendor has not responded to disclosure attempts, and no official patch is currently available. Although no known exploits are reported in the wild, the public disclosure of the exploit code increases the risk of exploitation. The CVSS 4.0 base score is 5.3 (medium severity), reflecting moderate impact and ease of exploitation. The vulnerability impacts confidentiality, integrity, and availability to a limited extent, as the attacker can potentially access internal services, scan internal networks, or cause denial of service by triggering unintended requests. However, the vulnerability does not require privileges or user interaction, increasing its risk profile. The lack of vendor response and patch availability means organizations using Seeyon Zhiyuan OA 8.1 SP2 remain exposed until mitigations or updates are applied.
Potential Impact
For European organizations using Seeyon Zhiyuan OA Web Application System, this SSRF vulnerability poses a significant risk. The ability to force the server to make arbitrary requests can lead to unauthorized internal network reconnaissance, access to sensitive internal services (such as databases, metadata services, or intranet applications), and potential data exfiltration or lateral movement within the network. Confidentiality could be compromised if internal endpoints expose sensitive information. Integrity and availability could also be affected if attackers leverage SSRF to trigger destructive actions or denial of service conditions on internal resources. Given that Seeyon Zhiyuan OA is an office automation platform, it likely handles sensitive corporate data, workflows, and communications, increasing the potential impact. The absence of a vendor patch and the public availability of exploit details heighten the urgency for European organizations to implement mitigations. The medium CVSS score suggests moderate risk, but the real-world impact could be higher depending on the internal network architecture and the criticality of the OA system within the organization.
Mitigation Recommendations
1. Immediate mitigation should include implementing network-level controls to restrict the OA server's outbound HTTP requests, limiting them only to trusted destinations. 2. Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious SSRF payloads targeting the vulnerable 'url' parameter. 3. Conduct internal network segmentation to isolate critical internal services from the OA server's network segment, reducing the attack surface. 4. Monitor logs for unusual outbound requests from the OA server, especially to internal IP ranges or unexpected external endpoints. 5. If possible, disable or restrict the functionality invoking this.oursNetService.getData until a patch is available. 6. Engage with Seeyon or third-party security vendors for potential unofficial patches or workarounds. 7. Plan for an update or migration to a patched version once available. 8. Educate IT and security teams about SSRF risks and detection techniques specific to this product. These targeted mitigations go beyond generic advice by focusing on network controls, monitoring, and application-specific restrictions.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-23T19:02:11.817Z
- Cisa Enriched
- false
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683277bd0acd01a24927eddb
Added to database: 5/25/2025, 1:51:57 AM
Last enriched: 7/9/2025, 1:24:49 AM
Last updated: 7/30/2025, 4:09:43 PM
Views: 16
Related Threats
CVE-2025-54466: CWE-94 Improper Control of Generation of Code ('Code Injection') in Apache Software Foundation Apache OFBiz
UnknownCVE-2025-9053: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9052: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9019: Heap-based Buffer Overflow in tcpreplay
LowCVE-2025-9017: Cross Site Scripting in PHPGurukul Zoo Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.