Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69299: Server-Side Request Forgery (SSRF) in Laborator Oxygen

0
High
VulnerabilityCVE-2025-69299cvecve-2025-69299
Published: Fri Feb 20 2026 (02/20/2026, 15:46:46 UTC)
Source: CVE Database V5
Vendor/Project: Laborator
Product: Oxygen

Description

CVE-2025-69299 is a Server-Side Request Forgery (SSRF) vulnerability affecting Laborator Oxygen versions up to 6. 0. 8. This flaw allows an attacker to induce the server to make unintended HTTP requests, potentially accessing internal resources or services not directly exposed to the internet. No known exploits are currently in the wild, and no CVSS score has been assigned yet. The vulnerability could lead to unauthorized data access, internal network reconnaissance, or further exploitation depending on the server environment. Mitigation requires applying patches once available, restricting server outbound requests, and implementing strict input validation. Organizations using Laborator Oxygen, especially in sectors with sensitive internal networks, should prioritize addressing this issue. Countries with significant deployments of Laborator Oxygen or critical infrastructure using this product are at higher risk. Given the potential impact and ease of exploitation without authentication, the severity is assessed as high.

AI-Powered Analysis

AILast updated: 02/20/2026, 21:33:00 UTC

Technical Analysis

CVE-2025-69299 is a Server-Side Request Forgery (SSRF) vulnerability identified in Laborator Oxygen, a software product used for web and application security testing. The vulnerability affects all versions up to and including 6.0.8. SSRF vulnerabilities occur when an attacker can manipulate a server to send crafted requests to internal or external systems on behalf of the server, bypassing network access controls. In this case, the flaw allows attackers to coerce the Oxygen server into making arbitrary HTTP requests, potentially accessing internal services, cloud metadata endpoints, or other restricted resources that are not directly accessible externally. This can lead to sensitive information disclosure, internal network mapping, or pivoting to other attacks such as remote code execution if combined with other vulnerabilities. The vulnerability was reserved at the end of 2025 and published in early 2026, with no CVSS score assigned yet and no known exploits in the wild. The lack of authentication requirements or user interaction details suggests the attack surface may be broad, depending on how Oxygen is deployed and accessed. The absence of patch links indicates that fixes may not yet be publicly available, emphasizing the need for proactive mitigation strategies.

Potential Impact

The impact of CVE-2025-69299 can be significant for organizations using Laborator Oxygen, especially those with sensitive internal networks or cloud environments. Successful exploitation could allow attackers to bypass perimeter defenses, access internal-only services, retrieve sensitive data such as credentials or configuration files, and perform reconnaissance to facilitate further attacks. In cloud environments, SSRF can enable access to metadata services, potentially exposing credentials or tokens that lead to full account compromise. The vulnerability could also be leveraged to attack other internal systems indirectly, increasing the attack surface. For organizations relying on Oxygen for security testing, exploitation could undermine trust in the tool and expose critical infrastructure. Although no exploits are currently known, the potential for damage is high given the nature of SSRF vulnerabilities and the typical deployment contexts of such software.

Mitigation Recommendations

Organizations should monitor Laborator's official channels for patches addressing CVE-2025-69299 and apply them promptly once available. Until patches are released, implement network-level restrictions to limit the Oxygen server's ability to make outbound HTTP requests, especially to internal IP ranges and sensitive endpoints like cloud metadata services. Employ strict input validation and sanitization on any user-controllable parameters that influence server requests. Use web application firewalls (WAFs) or intrusion prevention systems (IPS) to detect and block suspicious request patterns indicative of SSRF attempts. Conduct thorough security reviews of Oxygen deployments to ensure minimal exposure and isolate the server within segmented network zones. Additionally, monitor logs for anomalous outbound requests and unusual server behavior. Educate security teams about SSRF risks and incorporate this vulnerability into incident response plans.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-31T20:11:57.533Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6998c9f5be58cf853bab8797

Added to database: 2/20/2026, 8:54:13 PM

Last enriched: 2/20/2026, 9:33:00 PM

Last updated: 2/21/2026, 6:22:34 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats