Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64327: CWE-918: Server-Side Request Forgery (SSRF) in MatiasDesuu ThinkDashboard

0
Medium
VulnerabilityCVE-2025-64327cvecve-2025-64327cwe-918
Published: Thu Nov 06 2025 (11/06/2025, 21:07:17 UTC)
Source: CVE Database V5
Vendor/Project: MatiasDesuu
Product: ThinkDashboard

Description

ThinkDashboard is a self-hosted bookmark dashboard built with Go and vanilla JavaScript. Versions 0.6.7 and below contain a Blind Server-Side Request Forgery (SSRF) vulnerability, in its `/api/ping?url= endpoint`. This allows an attacker to make arbitrary requests to internal or external hosts. This can include discovering ports open on the local machine, hosts on the local network, and ports open on the hosts on the internal network. This issue is fixed in version 0.6.8.

AI-Powered Analysis

AILast updated: 11/06/2025, 21:29:53 UTC

Technical Analysis

CVE-2025-64327 is a Server-Side Request Forgery (SSRF) vulnerability identified in ThinkDashboard, a self-hosted bookmark dashboard application developed in Go and vanilla JavaScript. The vulnerability exists in versions 0.6.7 and earlier within the /api/ping?url= endpoint. This endpoint accepts a URL parameter and attempts to ping the specified URL. Due to insufficient input validation and lack of proper request filtering, an attacker can craft malicious requests that cause the server to perform arbitrary HTTP requests to internal or external network resources. This Blind SSRF allows attackers to probe internal network hosts and ports that are otherwise inaccessible externally, facilitating network reconnaissance and potentially enabling further exploitation of internal services. The vulnerability does not require authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the network attack vector, low complexity, no privileges required, and no user interaction needed. Confidentiality impact is limited to information disclosure via network scanning, with no direct impact on integrity or availability. The vulnerability was reserved on 2025-10-30 and published on 2025-11-06. No public exploits have been reported to date. The vendor fixed the issue in ThinkDashboard version 0.6.8 by implementing proper input validation and request filtering to prevent SSRF attacks.

Potential Impact

For European organizations, this SSRF vulnerability poses a risk primarily related to internal network reconnaissance and potential information disclosure. Attackers exploiting this flaw can map internal network topology, identify open ports, and discover services that may be vulnerable to further attacks. This is particularly concerning for organizations with sensitive internal infrastructure accessible only within private networks. While the vulnerability itself does not allow direct data modification or service disruption, it can serve as a stepping stone for lateral movement or targeted attacks against internal assets. Organizations using ThinkDashboard in environments with sensitive data or critical internal services should consider this a significant risk. The lack of authentication requirement increases the attack surface, especially if the dashboard is exposed to untrusted networks or the internet. The medium CVSS score reflects the moderate impact and ease of exploitation. Given the growing adoption of self-hosted tools in European SMEs and enterprises, the potential for exploitation exists, especially in sectors with complex internal networks such as finance, healthcare, and government.

Mitigation Recommendations

1. Upgrade ThinkDashboard to version 0.6.8 or later immediately to apply the official patch that fixes the SSRF vulnerability. 2. If upgrading is not immediately possible, restrict access to the ThinkDashboard instance using network segmentation and firewall rules to limit exposure to trusted internal users only. 3. Implement web application firewalls (WAF) with custom rules to detect and block suspicious requests targeting the /api/ping endpoint or containing unusual URL parameters. 4. Monitor network traffic logs for unusual outbound requests originating from the ThinkDashboard server, especially to internal IP ranges or uncommon ports. 5. Conduct internal network scans and penetration tests to identify any exposed services that could be targeted following SSRF exploitation. 6. Educate administrators and users about the risks of exposing self-hosted dashboards to public networks without proper access controls. 7. Apply the principle of least privilege to the server running ThinkDashboard, limiting its network access to only necessary resources. 8. Regularly review and update security policies regarding self-hosted applications and their exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-30T17:40:52.028Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690d0f9108e329e0f8f19b5b

Added to database: 11/6/2025, 9:13:53 PM

Last enriched: 11/6/2025, 9:29:53 PM

Last updated: 11/8/2025, 12:31:17 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats