CVE-2025-71259: CWE-918 Server-Side Request Forgery (SSRF) in BMC Software, Inc. FootPrints
BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a blind server-side request forgery vulnerability in the externalfeed/RSS API component that allows authenticated attackers to trigger arbitrary outbound requests from the server. Attackers can exploit insufficient validation of externally supplied resource references to interact with internal services or cause resource exhaustion impacting availability. The following hotfixes remediate the vulnerability: 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01.
AI Analysis
Technical Summary
CVE-2025-71259 is a server-side request forgery vulnerability classified under CWE-918, found in BMC Software's FootPrints IT Service Management (ITSM) product. The vulnerability resides in the externalfeed/RSS API component of FootPrints versions 20.20.02 through 20.24.01.001. It allows an authenticated attacker with low privileges to send crafted requests that cause the server to initiate arbitrary outbound HTTP requests. This occurs due to insufficient validation of externally supplied resource references, enabling attackers to coerce the server into interacting with internal network services that may not be directly accessible externally. The SSRF can be exploited blindly, meaning attackers do not receive direct response data but can infer success through side effects. Potential impacts include unauthorized internal network reconnaissance, exploitation of internal services, or resource exhaustion leading to denial of service. The vulnerability does not require user interaction and does not affect confidentiality or integrity directly but can impact availability and internal network security posture. BMC has released multiple hotfixes across affected versions to address this issue, and no public exploits have been reported to date.
Potential Impact
The primary impact of CVE-2025-71259 is the potential for attackers to leverage the SSRF vulnerability to interact with internal services that are otherwise inaccessible, potentially exposing sensitive internal resources or enabling lateral movement within an organization's network. Additionally, attackers can cause resource exhaustion on the FootPrints server, leading to degraded performance or denial of service, impacting availability of ITSM services critical for organizational operations. Since the vulnerability requires authentication with low privileges, insider threats or compromised accounts could be leveraged to exploit this flaw. The lack of direct data exfiltration reduces confidentiality impact, but the ability to reach internal systems poses a significant risk, especially in segmented or sensitive environments. Organizations relying on BMC FootPrints for IT service management could face operational disruptions and increased risk of internal network compromise if this vulnerability is exploited.
Mitigation Recommendations
Organizations should promptly apply the official hotfixes provided by BMC Software for their specific FootPrints ITSM version to remediate the SSRF vulnerability. In addition, implement strict network segmentation and firewall rules to limit the FootPrints server's ability to initiate outbound requests to only necessary destinations. Monitor and audit authenticated user activities to detect unusual patterns that may indicate exploitation attempts. Employ strong authentication and access controls to minimize the risk of account compromise or misuse by low-privilege users. Consider deploying web application firewalls (WAFs) with rules designed to detect and block SSRF attack patterns targeting the externalfeed/RSS API endpoints. Regularly review and update security policies related to internal service exposure and outbound traffic from critical servers. Finally, conduct internal penetration testing and vulnerability assessments to verify the effectiveness of mitigations.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, India, Netherlands, South Korea
CVE-2025-71259: CWE-918 Server-Side Request Forgery (SSRF) in BMC Software, Inc. FootPrints
Description
BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a blind server-side request forgery vulnerability in the externalfeed/RSS API component that allows authenticated attackers to trigger arbitrary outbound requests from the server. Attackers can exploit insufficient validation of externally supplied resource references to interact with internal services or cause resource exhaustion impacting availability. The following hotfixes remediate the vulnerability: 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01.
AI-Powered Analysis
Technical Analysis
CVE-2025-71259 is a server-side request forgery vulnerability classified under CWE-918, found in BMC Software's FootPrints IT Service Management (ITSM) product. The vulnerability resides in the externalfeed/RSS API component of FootPrints versions 20.20.02 through 20.24.01.001. It allows an authenticated attacker with low privileges to send crafted requests that cause the server to initiate arbitrary outbound HTTP requests. This occurs due to insufficient validation of externally supplied resource references, enabling attackers to coerce the server into interacting with internal network services that may not be directly accessible externally. The SSRF can be exploited blindly, meaning attackers do not receive direct response data but can infer success through side effects. Potential impacts include unauthorized internal network reconnaissance, exploitation of internal services, or resource exhaustion leading to denial of service. The vulnerability does not require user interaction and does not affect confidentiality or integrity directly but can impact availability and internal network security posture. BMC has released multiple hotfixes across affected versions to address this issue, and no public exploits have been reported to date.
Potential Impact
The primary impact of CVE-2025-71259 is the potential for attackers to leverage the SSRF vulnerability to interact with internal services that are otherwise inaccessible, potentially exposing sensitive internal resources or enabling lateral movement within an organization's network. Additionally, attackers can cause resource exhaustion on the FootPrints server, leading to degraded performance or denial of service, impacting availability of ITSM services critical for organizational operations. Since the vulnerability requires authentication with low privileges, insider threats or compromised accounts could be leveraged to exploit this flaw. The lack of direct data exfiltration reduces confidentiality impact, but the ability to reach internal systems poses a significant risk, especially in segmented or sensitive environments. Organizations relying on BMC FootPrints for IT service management could face operational disruptions and increased risk of internal network compromise if this vulnerability is exploited.
Mitigation Recommendations
Organizations should promptly apply the official hotfixes provided by BMC Software for their specific FootPrints ITSM version to remediate the SSRF vulnerability. In addition, implement strict network segmentation and firewall rules to limit the FootPrints server's ability to initiate outbound requests to only necessary destinations. Monitor and audit authenticated user activities to detect unusual patterns that may indicate exploitation attempts. Employ strong authentication and access controls to minimize the risk of account compromise or misuse by low-privilege users. Consider deploying web application firewalls (WAFs) with rules designed to detect and block SSRF attack patterns targeting the externalfeed/RSS API endpoints. Regularly review and update security policies related to internal service exposure and outbound traffic from critical servers. Finally, conduct internal penetration testing and vulnerability assessments to verify the effectiveness of mitigations.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-03-02T15:04:45.927Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69bc0011e32a4fbe5fc6a5cf
Added to database: 3/19/2026, 1:54:25 PM
Last enriched: 3/19/2026, 2:09:12 PM
Last updated: 3/20/2026, 5:17:19 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.