Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67427: n/a

0
Medium
VulnerabilityCVE-2025-67427cvecve-2025-67427
Published: Mon Jan 05 2026 (01/05/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-67427 is a Blind Server-Side Request Forgery (SSRF) vulnerability affecting evershop version 2. 1. 0 and earlier. It allows unauthenticated attackers to exploit the "GET /images" API endpoint by manipulating the "src" query parameter to force the server to initiate arbitrary HTTP or HTTPS requests. This occurs due to insufficient validation of the input, enabling attackers to make requests to internal or external network resources without authentication or user interaction. The vulnerability has a CVSS score of 6. 5, indicating medium severity, primarily impacting confidentiality and integrity but not availability. No known exploits are currently in the wild, and no official patches have been released yet. European organizations using evershop 2. 1.

AI-Powered Analysis

AILast updated: 01/12/2026, 21:39:56 UTC

Technical Analysis

CVE-2025-67427 is a Blind Server-Side Request Forgery (SSRF) vulnerability identified in evershop version 2.1.0 and prior. The vulnerability arises from insufficient validation of the "src" query parameter in the "GET /images" API endpoint. An unauthenticated attacker can exploit this flaw by crafting a request that causes the server to initiate HTTP or HTTPS requests to arbitrary URIs, including internal network addresses or external systems. This can lead to unauthorized information disclosure or internal network scanning, as the attacker can infer responses based on server behavior despite the blind nature of the SSRF. The vulnerability is classified under CWE-918, which relates to improper restriction of outbound requests from a server. The CVSS v3.1 base score is 6.5, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to confidentiality and integrity (C:L/I:L/A:N). Although no exploits are currently known in the wild and no patches have been published, the risk remains significant due to the unauthenticated nature and potential for internal network reconnaissance or data leakage. The vulnerability does not affect availability directly but can be leveraged as a stepping stone for further attacks. Organizations using vulnerable versions of evershop should be aware of the risk and implement mitigations promptly.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized internal network reconnaissance and potential data leakage, which can compromise sensitive business information and customer data. Evershop is an e-commerce platform, so exploitation could lead to exposure of internal services, backend APIs, or cloud metadata endpoints, increasing the attack surface for further exploitation. The unauthenticated nature of the vulnerability means attackers can exploit it remotely without credentials, raising the threat level. Confidentiality and integrity of data may be impacted if attackers use SSRF to access internal resources or manipulate backend services. While availability is not directly affected, the vulnerability can facilitate lateral movement or privilege escalation within the network. Given the importance of e-commerce in Europe and strict data protection regulations such as GDPR, any data leakage or unauthorized access could result in regulatory penalties and reputational damage. Organizations relying on evershop should consider this vulnerability a medium risk but prioritize mitigation to prevent potential exploitation.

Mitigation Recommendations

1. Implement strict input validation and sanitization on the "src" query parameter to allow only trusted and expected URIs, ideally using a whitelist approach. 2. Restrict outbound HTTP/HTTPS requests from the evershop server to only necessary external endpoints, blocking access to internal IP ranges and sensitive metadata services. 3. Employ network segmentation and firewall rules to limit the server's ability to reach internal services that should not be externally accessible. 4. Monitor server logs and network traffic for unusual outbound requests or patterns indicative of SSRF exploitation attempts. 5. If possible, upgrade to a patched version of evershop once available or apply vendor-provided mitigations. 6. Use Web Application Firewalls (WAFs) with rules designed to detect and block SSRF attack patterns targeting the "src" parameter. 7. Conduct regular security assessments and penetration tests focusing on SSRF and related vulnerabilities. 8. Educate development teams about secure coding practices to prevent similar input validation issues in the future.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c16933839e441758db0b4

Added to database: 1/5/2026, 7:52:51 PM

Last enriched: 1/12/2026, 9:39:56 PM

Last updated: 2/7/2026, 12:35:59 PM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats