Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67427: n/a

0
Medium
VulnerabilityCVE-2025-67427cvecve-2025-67427
Published: Mon Jan 05 2026 (01/05/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A Blind Server-Side Request Forgery (SSRF) vulnerability in evershop 2.1.0 and prior allows unauthenticated attackers to force the server to initiate an HTTP request via the "GET /images" API. The vulnerability occurs due to insufficient validation of the "src" query parameter, which permits arbitrary HTTP or HTTPS URIs, resulting in unexpected requests against internal and external networks.

AI-Powered Analysis

AILast updated: 01/05/2026, 20:07:31 UTC

Technical Analysis

CVE-2025-67427 is a Blind Server-Side Request Forgery (SSRF) vulnerability identified in evershop version 2.1.0 and earlier. The vulnerability exists in the "GET /images" API endpoint, specifically in the handling of the "src" query parameter. Due to insufficient validation, attackers can supply arbitrary HTTP or HTTPS URIs, causing the server to initiate requests to internal or external network resources. This SSRF flaw is termed 'blind' because the attacker does not directly receive the response from the server's request, making exploitation more challenging but still dangerous. The vulnerability allows unauthenticated attackers to potentially scan internal networks, access internal-only services, or interact with external systems under the guise of the vulnerable server. Such capabilities can be leveraged for reconnaissance, bypassing firewalls, or pivoting attacks within a network. The lack of authentication requirement increases the attack surface, allowing remote exploitation without credentials. Although no public exploits are currently known, the vulnerability's presence in a widely used e-commerce platform like evershop raises concerns about potential future exploitation. The absence of a CVSS score suggests the need for a severity assessment based on impact and exploitability factors. The vulnerability's root cause is the failure to properly sanitize and validate the "src" parameter, which should restrict allowed URI schemes and destinations. Without patches currently available, organizations must implement compensating controls to mitigate risk.

Potential Impact

For European organizations, the impact of CVE-2025-67427 can be significant, particularly for those using evershop as part of their e-commerce or internal web infrastructure. Exploitation could allow attackers to perform internal network reconnaissance, potentially exposing sensitive internal services or data repositories that are not otherwise accessible externally. This could lead to further attacks such as data exfiltration, lateral movement, or disruption of services. The ability to initiate arbitrary HTTP requests from the server can also be abused to interact with third-party services, potentially leading to abuse scenarios such as SSRF-based attacks on cloud metadata services or internal APIs. Confidentiality is at risk due to unauthorized access to internal resources, and integrity could be compromised if attackers manipulate internal services. Availability impact is lower but possible if attackers use SSRF to trigger resource exhaustion or denial-of-service conditions. The unauthenticated nature of the vulnerability increases risk, as attackers do not need valid credentials. European organizations with strict data protection regulations (e.g., GDPR) may face compliance risks if internal data is exposed. The threat is heightened in sectors with critical infrastructure or sensitive data, such as finance, healthcare, and government.

Mitigation Recommendations

1. Immediate network-level controls: Restrict outbound HTTP/HTTPS requests from evershop servers to only trusted destinations using firewall rules or proxy filtering to prevent arbitrary external or internal requests. 2. Input validation: Implement strict validation and sanitization of the "src" query parameter to allow only expected and safe URI schemes and destinations. 3. Disable or restrict the vulnerable API endpoint if possible until a patch is available. 4. Monitor server logs and network traffic for unusual outbound requests originating from the evershop server, which may indicate exploitation attempts. 5. Employ web application firewalls (WAFs) with rules designed to detect and block SSRF patterns targeting the "src" parameter. 6. Keep evershop installations updated and subscribe to vendor advisories for patches addressing this vulnerability. 7. Conduct internal security assessments and penetration tests focusing on SSRF vectors to identify and remediate similar issues. 8. Segment internal networks to limit the impact of SSRF exploitation by restricting server access to sensitive internal services. 9. Educate development teams on secure coding practices to prevent SSRF and similar injection vulnerabilities in future releases.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c16933839e441758db0b4

Added to database: 1/5/2026, 7:52:51 PM

Last enriched: 1/5/2026, 8:07:31 PM

Last updated: 1/8/2026, 11:05:50 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats