Skip to main content

CVE-2025-59055: CWE-918: Server-Side Request Forgery (SSRF) in instantsoft icms2

Medium
VulnerabilityCVE-2025-59055cvecve-2025-59055cwe-918
Published: Thu Sep 11 2025 (09/11/2025, 18:46:29 UTC)
Source: CVE Database V5
Vendor/Project: instantsoft
Product: icms2

Description

InstantCMS is a free and open source content management system. A blind Server-Side Request Forgery (SSRF) vulnerability in InstantCMS up to and including 2.17.3 allows authenticated remote attackers to make nay HTTP/HTTPS request via the package parameter. It is possible to make any HTTP/HTTPS request to any website in installer functionality. Due to such vulnerability it is possible to for example scan local network, call local services and its functions, conduct a DoS attack, and/or disclose a server's real IP if it's behind a reverse proxy. It is also possible to exhaust server resources by sending plethora of such requests. As of time of publication, no patched releases are available.

AI-Powered Analysis

AILast updated: 09/11/2025, 18:54:11 UTC

Technical Analysis

CVE-2025-59055 is a Server-Side Request Forgery (SSRF) vulnerability identified in InstantCMS, an open-source content management system, specifically affecting versions up to and including 2.17.3 of the icms2 product. SSRF vulnerabilities allow an attacker to induce the server-side application to make HTTP or HTTPS requests to arbitrary domains or IP addresses. In this case, the vulnerability exists in the installer functionality where the 'package' parameter can be manipulated by an authenticated attacker to trigger arbitrary HTTP/HTTPS requests. This is classified as a blind SSRF, meaning the attacker does not directly see the response but can infer success or failure through side effects. Exploiting this flaw, an attacker with valid credentials can scan internal networks, access local services that are otherwise inaccessible externally, and potentially enumerate internal infrastructure. Additionally, the attacker can cause denial-of-service (DoS) conditions by overwhelming the server with numerous crafted requests, exhausting resources. Another critical risk is the potential disclosure of the server's real IP address if it is behind a reverse proxy, which can aid further attacks. As of the publication date, no patches or fixes have been released, leaving affected systems vulnerable. The CVSS v3.1 base score is 4.7 (medium severity), reflecting the requirement for authentication (PR:H), no user interaction (UI:N), and the potential for limited confidentiality, integrity, and availability impacts. The vulnerability is categorized under CWE-918, which covers SSRF issues. No known exploits have been reported in the wild yet, but the presence of this vulnerability in a widely used CMS component poses a tangible risk, especially in environments where internal network segmentation and access controls are weak or where the installer functionality is exposed or accessible.

Potential Impact

For European organizations using InstantCMS icms2 version 2.17.3 or earlier, this SSRF vulnerability could lead to significant security risks. Attackers with valid credentials could leverage this flaw to perform reconnaissance on internal networks, potentially discovering sensitive services and systems that are not exposed externally. This could facilitate lateral movement within the network or enable further exploitation of internal applications. The ability to cause DoS conditions by resource exhaustion could disrupt business operations, impacting availability of web services. Disclosure of the server's real IP address behind reverse proxies could undermine network security postures and expose infrastructure to targeted attacks. Given the widespread use of CMS platforms in European public and private sectors, including government portals, educational institutions, and SMEs, the vulnerability could affect critical services if not mitigated. Moreover, the requirement for authentication limits the attack surface but does not eliminate risk, especially in environments with weak credential management or insider threats. The lack of an available patch increases the urgency for organizations to implement compensating controls. Overall, the vulnerability could compromise confidentiality, integrity, and availability of affected systems, potentially leading to data breaches, service interruptions, and reputational damage.

Mitigation Recommendations

1. Restrict access to the installer functionality: Ensure that the installer or setup pages are disabled or inaccessible on production systems after deployment. 2. Enforce strict authentication and authorization controls: Limit access to trusted administrators only, and implement strong credential policies including multi-factor authentication to reduce the risk of credential compromise. 3. Network segmentation and firewall rules: Configure internal firewalls to restrict outbound HTTP/HTTPS requests from the CMS server to only necessary external endpoints, preventing arbitrary requests to internal services. 4. Monitor and log HTTP requests originating from the CMS server, especially those triggered via the 'package' parameter, to detect anomalous or excessive request patterns indicative of exploitation attempts. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SSRF payloads targeting the installer functionality. 6. Regularly audit and update CMS components and monitor vendor communications for patches or updates addressing this vulnerability. 7. If feasible, temporarily disable or isolate the installer module until a patch is available. 8. Conduct internal penetration testing focusing on SSRF vectors to identify and remediate similar weaknesses. These steps go beyond generic advice by focusing on limiting the attack surface, monitoring for exploitation attempts, and controlling network flows specific to this vulnerability context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-08T16:19:26.173Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c31ac15fe4190550a2ff51

Added to database: 9/11/2025, 6:53:53 PM

Last enriched: 9/11/2025, 6:54:11 PM

Last updated: 9/11/2025, 8:44:59 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats